Incremental Cryptography and Memory Checkers
نویسنده
چکیده
We introduce the relationship between incremental cryptography and memory checkers. We present an incremental message authentication scheme based on the XOR MACs which supports insertion, deletion and other single block operations. Our scheme takes only a constant number of pseudorandom function evaluations for each update step and produces smaller authentication codes than the tree scheme presented in BGG95]. Furthermore, it is secure against message substitution attacks, where the adversary is allowed to tamper messages before update steps, making it applicable to virus protection. From this scheme we derive memory checkers for data structures based on lists. Conversely, we use a lower bound for memory checkers to show that so-called message substitution detecting schemes produce signatures or authentication codes with size proportional to the message length.
منابع مشابه
Theory of Quantum Computation, Communication, and Cryptography, 4th Workshop, TQC 2009, Waterloo, Canada, May 11-13, 2009, Revised Selected Papers
The problem of memory checking considers storing files on an unreliable public server whose memory can be modified by a malicious party. The main task is to design an online memory checker with the capability to verify that the information on the server has not been corrupted. To store n bits of public information, the memory checker has s private reliable bits for verification purpose; while t...
متن کاملOffline Integrity Checking of Untrusted Storage
We extend the offline memory correctness checking scheme presented by Blum et. al [BEG91] to develop an offline checker that can detect attacks by active adversaries. We introduce the concept of incremental multiset hashes, and detail one example: MSet-XOR MAC, which uses a secret key, and is efficient as updating the hash costs a few hash and XOR operations. Using multiset hashes as our underl...
متن کاملLower Bounds for the Signature Size of Incremental Schemes
We show lower bounds for the signature size of incremental schemes which are secure against substitution attacks and support single block replacement. We prove that for documents of n blocks such schemes produce signatures of Ω(n) bits for any constant c > 0. For schemes accessing only a single block resp. a constant number of blocks for each replacement this bound can be raised to Ω(n) resp. Ω...
متن کاملبررسی آزمایشی مشکلات حافظه در مبتلایان به نوع وارسی اختلال وسواسی- اجباری
Abstract Introduction: The objective of this research was to determine memory problems (episodic memory, memory bias and memory confidence) in checking type obsessive-compulsive disorder (OCD). Method: Sixty individuals with OCD (30 checking and 30 washing types) were selected, together with 60 control individuals (30 with generalized anxiety disorder and 30 normal). The groups matched the che...
متن کامل"Perhaps you only imagined doing it": reality-monitoring in obsessive-compulsive checkers using semi-idiographic stimuli.
Memory failures reported by obsessive-compulsive (OC) checkers often seem to be errors of "reality-monitoring", or misremembering whether one performed or imagined performing an action. To examine these memory processes in the context in which such errors are said to occur, an in-home reality-monitoring experiment involving bothersome and non-bothersome actions was conducted with 21 OC checkers...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1997