• Corpus ID: 12873988

Managing Secrets with Consensus Networks: Fairness, Ransomware and Access Control

  title={Managing Secrets with Consensus Networks: Fairness, Ransomware and Access Control},
  author={Gabriel Kaptchuk and Ian Miers and Matthew Green},
  journal={IACR Cryptol. ePrint Arch.},
In this work we investigate the problem of using public consensus networks – exemplified by systems like Ethereum and Bitcoin – to perform cryptographic functionalities that involve the manipulation of secret data, such as cryptographic access control. We consider a hybrid paradigm in which a secure client-side functionality manages cryptographic secrets, while an online consensus network performs public computation. Using this approach, we explore both the constructive and potentially… 
Giving State to the Stateless: Augmenting Trustworthy Computation with Ledgers
This work considers a hybrid paradigm in which a client-side device performs secure computation, while interacting with a public ledger via a possibly malicious host computer, and shows that this combination allows for the construction of stateful interactive functionalities even when the device has no persistent storage.
Enclave Host Ledger k Enclave Host Ledger k Enclave Host k Enclave Host k ( a ) ( b )
In this work we investigate the problem of achieving secure computation by combining stateless trusted devices with public ledgers. We consider a hybrid paradigm in which a client-side device (such
NuCypher : A proxy re-encryption network to empower privacy in decentralized systems
NuCypher is a decentralized Key Management System (KMS) that addresses the limitations of using consensus networks to securely store and manipulate private, encrypted data [1]. It provides encryption
Overcoming Cryptographic Impossibility Results Using Blockchains
This work provides an abstract framework for formally analyzing and defining useful security properties for Proof-of-Stake (POS) based blockchain protocols and introduces the notion of pay-per-use programs which is simply a contract between two parties — service provider and customer.
Towards a Trusted and Privacy Preserving Membership Service in Distributed Ledger Using Intel Software Guard Extensions
This work proposes a membership service architecture that combines two promising technologies, distributed ledger and Intel Software Guard Extensions (SGX), and illustrates how SGX capabilities help to achieve security properties in each phase of membership service, including member registration, enrollment, transaction signing and verifying and transacting auditing.
NuCypher KMS: Decentralized key management system
NuCypher KMS provides encryption and cryptographic access controls, performed by a decentralized network, leveraging proxy re-encryption, that addresses the limitations of using consensus networks to securely store and manipulate private, encrypted data.
Blockchain Privacy-Preservation in Intelligent Transportation Systems
This paper describes the architecture of a car navigation system in which personal data protection is a major concern and aims to streamline traffic and calculate travel routes using blockchain technology.
Break-glass Encryption
“Break-glass” is a term used in IT healthcare systems to denote an emergency access to private information without having the credentials to do so.


1/p-Secure Multiparty Computation without Honest Majority and the Best of Both Worlds
The main result is constructions of 1/p-secure protocols that are resilient against any number of corrupt parties provided that the number of parties is constant and the size of the range of the functionality is at most polynomial (in the security parameter n).
Secure Multiparty Computations on Bitcoin
The Bit coin system can be used to go beyond the standard "emulation-based" definition of the MPCs, by constructing protocols that link their inputs and the outputs with the real Bit coin transactions.
How to generate and exchange secrets
  • A. Yao
  • 27th Annual Symposium on Foundations of Computer Science (sfcs 1986)
  • 1986
In this paper we introduce a new tool for controlling the knowledge transfer process in cryptographic protocol design. It is applied to solve a general class of problems which include most of the
A Security Analysis of the Emerging P2P-Based Personal Cloud Platform MaidSafe
This paper provides a condensed description of MaidSafe's key protocol mechanisms, derives the underlying identity and access management architecture, and evaluates it with respect to security and privacy aspects.
Partial Fairness in Secure Two-Party Computation
A definition of partial fairness within the standard real-/ideal-world paradigm is proposed and it is shown that there exist functions with super-polynomial domains and ranges for which it is impossible to achieve the definition.
Sealed-Glass Proofs: Using Transparent Enclaves to Prove and Sell Knowledge
This work shows how trusted hardware systems such as SGX can support trustworthy applications even in the presence of side channels, and proposes, formalize, and explores a cryptographic primitive called a Sealed-Glass Proof (SGP) that models computation possible in an isolated execution environment with unbounded leakage, and thus in the face of arbitrary side-channels.
Chosen-Ciphertext Security from Tag-Based Encryption
This paper revisits the notion of Tag-Based Encryption (TBE) and provides security definitions for the selective-tag case and shows how to apply the techniques gained from the TBE construction to directly design a new Key Encapsulation Mechanism.
Cloaking Malware with the Trusted Platform Module
It is shown that malware can use cloaked computations to hide essential secrets from a malware analyst and hardening legitimate uses of the TPM against attack improves the resilience of the malware.
Decentralized Anonymous Credentials
This work proposes a novel anonymous credential scheme that eliminates the need for a trusted credential issuer and provides a proof of security for a basic anonymous credential system that allows users to make flexible identity assertions with strong privacy guarantees without relying on trusted parties.
How to build time-lock encryption
  • Tibor Jager
  • Computer Science, Mathematics
    IACR Cryptol. ePrint Arch.
  • 2015
A new construction of a witness encryption scheme, based on Subset-Sum, achieves extractable security without relying on obfuscation and is independent of the implementations of multilinear maps.