Title: | Cryptographic protocol design |
Author(s): | Laur, Sven |
Date: | 2008 |
Language: | en |
Pages: | Verkkokirja (1541 KB, 131 s.) |
Department: | Tietojenkäsittelytieteen laitos |
ISBN: | 978-951-22-9293-6 978-951-22-9292-9 (printed) |
Subject: | Computer science |
Keywords: | asymptotic security, data authentication, exact security, homomorphic encryption, secure multi-party computation, sequential composability, subjective security, time-stamping, universal composability |
OEVS yes | |
|
|
Abstract:In this work, we investigate the security of interactive computations. The main emphasis is on the mathematical methodology that is needed to formalise and analyse various security properties. Differently from many classical treatments of secure multi-party computations, we always quantify security in exact terms. Although working with concrete time bounds and success probabilities is technically more demanding, it also has several advantages. As all security guarantees are quantitative, we can always compare different protocol designs. Moreover, these security guarantees also have a clear economical interpretation and it is possible to compare cryptographic and non-cryptographic solutions. The latter is extremely important in practice, since cryptographic techniques are just one possibility to achieve practical security. Also, working with exact bounds makes reasoning errors more apparent, as security proofs are less abstract and it is easier to locate false claims.
|
|
Parts:[Publication 1]: Bart Goethals, Sven Laur, Helger Lipmaa, and Taneli Mielikäinen. 2004. On private scalar product computation for privacy-preserving data mining. In: Choonsik Park and Seongtaek Chee, editors. Revised Selected Papers of the 7th International Conference on Information Security and Cryptology (ICISC 2004). Seoul, Korea, 2-3 December 2004. Lecture Notes in Computer Science, volume 3506, pages 104-120. © 2004 by authors and © 2004 Springer Science+Business Media. By permission.[Publication 2]: Sven Laur and Helger Lipmaa. 2007. A new protocol for conditional disclosure of secrets and its applications. In: Jonathan Katz and Moti Yung, editors. Proceedings of the 5th International Conference on Applied Cryptography and Network Security (ACNS 2007). Zhuhai, China, 5-8 June 2007. Lecture Notes in Computer Science, volume 4521, pages 207-225. © 2007 by authors and © 2007 Springer Science+Business Media. By permission.[Publication 3]: Ahto Buldas and Sven Laur. 2007. Knowledge-binding commitments with applications in time-stamping. In: Tatsuaki Okamoto and Xiaoyun Wang, editors. Proceedings of the 10th International Conference on Practice and Theory in Public-Key Cryptography (PKC 2007). Beijing, China, 16-20 April 2007. Lecture Notes in Computer Science, volume 4450, pages 150-165. © 2007 by authors and © 2007 Springer Science+Business Media. By permission.[Publication 4]: Sven Laur and Kaisa Nyberg. 2006. Efficient mutual data authentication using manually authenticated strings. In: David Pointceval, Yi Mu, and Kefei Chen, editors. Proceedings of the 5th International Conference on Cryptology and Network Security (CANS 2006). Suzhou, China, 8-10 December 2006. Lecture Notes in Computer Science, volume 4301, pages 90-107. © 2006 by authors and © 2006 Springer Science+Business Media. By permission. |
|
|
Unless otherwise stated, all rights belong to the author. You may download, display and print this publication for Your own personal use. Commercial use is prohibited.
Page content by: Aalto University Learning Centre | Privacy policy of the service | About this site