Certification and Authentication of Data Structures
نویسندگان
چکیده
We study query authentication schemes, algorithmic and cryptographic constructions that provideefficient and secure protocols for verifying the results of queries over structured data in untrusted oradversarial data distribution environments. We formally define the problem in a new data query and au-thentication setting that involves general query types answered in the RAM model of computation, andput forward a new approach for designing secure query authentication schemes that, through the newconcept of query certification, aims to authenticate the validity of the answer, rather than the entire pro-cess that generates the answer. Our main results state that this new authentication framework achievesgenerality, namely any query type admits a secure query authentication scheme, and also supports animportant type of modularity, namely the authentication of general queries based on the evaluation ofrelations over the data elements is reduced to the authentication of set-membership queries. Thus, in ad-dition to general possibility results under general assumptions and characterization results using existingcryptographic techniques, we contribute a clear separation between algorithmics and cryptography indata-authentication protocol design, and sufficient conditions for achieving super-efficient answer veri-fication in time asymptotically less than the time needed to answer the query.
منابع مشابه
I. Introduction
− Data certification and digital signature are a new area of interest and many standards have emerged. Indeed, these technologies offer identification, authentication and nonrepudiation capabilities during Internet transactions (emails and e-commerce). However, it appears that both certification and digital signature do not completely answer enterprise data authentication and secured data stora...
متن کاملThe Sb & ? Lrt Diskette
(i) Identity verification of the user, for controlling access both to resources within the local PC workstation and to remote teleprocessing services on other machines. (ii) File encryption at the PC for secure storage. (iii) Message encryption and message authentication for secure communications. (iv) Digital signatures for proof of origin of communications and for data and software certificat...
متن کاملA flexible, large-scale authentication policy for WLAN roaming users using IPSec and public key certification
With the growing deployment of WLAN hotspots there is a real need of a large-scale, easyto-use authentication policy for enabling hot-spot providers to allow access to the Internet to authorized users. This paper presents an authentication schema based on asymmetric cryptography and public key certification. These mechanisms are used to establish IPSec tunnels between WLAN supplicants and gatew...
متن کاملCertification and Authentication Services for Securing MANET Routing Protocols
In this paper, we describe a new authentication service for securing mobile ad hoc network (MANET) routing protocols. A MANET authentication extension (MAE) is appended to each routing protocol message. Our design includes a self-organized certification service, adapted from [6] with the following improvements: appropriated initialization, correcting vulnerabilities in the original design; loca...
متن کاملReviewing MANETs & Configurations of Certification Authority (CA) for node Authentication
A Mobile Ad hoc Network (MANET) is a temporary network of wireless mobile devices deployed without the aid of any pre-existing infrastructure or centralized administration. But this fascinating technology is studded with a number of serious challenges that need to be well catered before its successful deployment. These challenges include security issues related to key management, routing, node ...
متن کامل