Inscriere cercetatori

Premii Ad Astra

premii Ad Astra

Asociația Ad Astra a anunțat câștigătorii Premiilor Ad Astra 2022: http://premii.ad-astra.ro/. Proiectul și-a propus identificarea și popularizarea modelelor de succes, a rezultatelor excepționale ale cercetătorilor români din țară și din afara ei.

Asociatia Ad Astra a cercetatorilor romani lanseaza BAZA DE DATE A CERCETATORILOR ROMANI DIN DIASPORA. Scopul acestei baze de date este aceea de a stimula colaborarea dintre cercetatorii romani de peste hotare dar si cu cercetatorii din Romania. Cercetatorii care doresc sa fie nominalizati in aceasta baza de date sunt rugati sa trimita un email la cristian.presura@gmail.com

Achieving Security Despite Compromise Using Zero-knowledge

Domenii publicaţii > Ştiinţe informatice + Tipuri publicaţii > Articol în volumul unei conferinţe

Autori: Michael Backes, Martin Grochulla, Catalin Hritcu, and Matteo Maffei

Editorial: IEEE Computer Society Press, 22th IEEE Symposium on Computer Security Foundations (CSF 2009), p.308-323, 2009.

Rezumat:

One of the important challenges when designing and analyzing
cryptographic protocols is the enforcement of security properties in the
presence of compromised participants. This paper presents
a general technique for strengthening cryptographic protocols in order to
satisfy authorization policies despite participant compromise.
The central idea is to automatically transform the original cryptographic
protocols by adding non-interactive zero-knowledge proofs.
Each participant proves that the messages sent to the other
participants are generated in accordance to the protocol.
The zero-knowledge proofs are forwarded to ensure the correct behavior of all
participants involved in the protocol, without revealing any secret data.
We use an enhanced type system for zero-knowledge to verify that the
transformed protocols conform to their authorization policy even if
some participants are compromised.
Finally, we developed a tool that automatically generates ML implementations of
protocols based on zero-knowledge proofs.
The protocol transformation, the verification, and the generation of
protocol implementations are fully automated.

Cuvinte cheie: security types transformation zero-knowledge

URL: http://www.infsec.cs.uni-sb.de/~hritcu/publications/zk-compromise-full.pdf