de
en
Schliessen
Detailsuche
Bibliotheken
Projekt
Impressum
Datenschutz
de
en
Schliessen
Impressum
Datenschutz
zum Inhalt
Detailsuche
Schnellsuche:
OK
Ergebnisliste
Titel
Titel
Inhalt
Inhalt
Seite
Seite
Im Dokument suchen
On practical subversion-resilience / Pascal Bemmann, M.Sc. Wuppertal, October 30, 2023
Inhalt
Acknowledgements
Abstract
Zusammenfassung
Acronyms
Introduction
Motivating Subversion Resilience
Legal Backdoors
Scope of this Thesis
Related Work
Attacks
Countermeasures and Models
Miscellaneous
Contributions of this Thesis
Thesis Outline
Preliminaries
Notation
Provable Security
The Random Oracle Model
Subversion-Resilient Public-Key Encryption with Practical Watchdogs
Practical Watchdogs
Our Results
Main Technical Challenge
Our Approach
Comparison with Prior Work
Concrete Subversion Model
A General Security Definition for Cryptographic Schemes
Subversion-Resilience with an Offline Watchdog
The Split-Program Model and Trusted Amalgamation
Subversion-Resilient Randomness Generators
Construction
Security
Subversion-Resilient Key Encapsulation Mechanisms
Main Technical Challenge
Our Proposed KEM
Efficient Instantiations
From OW to IND Security
Subversion-Resilient Public-Key Encryption
On the Impossibility of Subversion-Resilient Indistinguishability
Discussion
Security under Complete Subversion Without Random Oracles
Complete Subversion
Asymptotic Subversion Model
Subversion-Resilient Authenticated Encryption
Symmetric Cryptography under Complete Subversion
Technical Challenges
Our Contributions
Comparison with Prior Work
Pseudorandom Functions
Constructing Subversion-Resilient PRFs
Message Authentication Codes
MAC from PRFs
Symmetric Encryption
Subversion-Resilience of Stream Ciphers.
Constructing Subversion-Resilient Authenticated Encryption
Achieving Subversion-Resilience via Encrypt-then-MAC
Discussion
Subversion-Resilient Digital Signatures
Technical Challenges
Our Contributions
Subversion-Resilient Signatures in Other Models
Outline
Simplifying Assumptions
One-Way Functions
One-Way Functions and Permutations
Subversion-Resilient One-Way Functions
Hash Functions
Constructing Subversion-Resilient Signatures
Digital Signatures
Lamport Signatures
The Naor-Yung Construction
Discussion
Conclusion
Discussion
Offline Watchdogs vs. Alternative Models
Our Results
Open Problems
Conclusion
Bibliography