ABSTRACT
Distributed computing is at the heart of modern system architectures and infrastructures. But as security and privacy have increasingly become critical to every organization, modern cryptography is making its way into core systems. In this talk, I will describe work that focuses on using modern cryptographic techniques in large scale practical distributed systems in order to improve their security and privacy guarantees. I will show how both cryptographic techniques and distributed systems need to be adapted to make this work and how to think about the security of these new encrypted distributed systems.
Supplemental Material
Index Terms
Encrypted Distributed Systems
Recommendations
Practical verifiably encrypted signature based on Waters signatures
Waters proposed the first efficient signature scheme that is known to be existentially unforgeable based on the standard computational Diffie‐Hellman assumption without random oracles. Lu et al. then proposed the first verifiably encrypted signature (VES) ...
Public-Key encryption from ID-Based encryption without one-time signature
OTM'06: Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part IDesign a secure public key encryption scheme and its security proof are one of the main interests in cryptography In 2004, Canetti, Halevi and Katz [8] constructed a public key encryption (PKE) from a selective identity-based encryption scheme with a ...
A novel identity-based strong designated verifier signature scheme
Unlike ordinary digital signatures, a designated verifier signature scheme makes it possible for a signer to convince a designated verifier that she has signed a message in such a way that the designated verifier cannot transfer the signature to a third ...
Comments