How to Store some Secrets
نویسندگان
چکیده
This paper introduces a special type of symmetric cryptosystem called multi-encryption scheme. It allows users to encrypt multiple plaintexts into a single ciphertext. Each plaintext is protected with its own secret key, meaning that they can be decrypted individually by applying the decryption function with the corresponding key to the ciphertext. Compared to encrypting the ciphertexts one-by-one using a standard symmetric cryptosystem, the main advantage of using a multi-encryption scheme is the no-search property, which guarantees that knowing the key is sufficient for decrypting a single plaintext. We show how to construct a multiencryption scheme based on polynomials over finite fields. A possible application area is coercion-resistant electronic voting. To ensure a strong form of privacy, voters are equipped with multiple fake credentials, which are indistinguishable from the proper one. While theoretically sound, this requires a voter to perfectly recall multiple lengthy random numbers, and to know which of them is the proper one. To ensure 100% recall, users need to manage these numbers and keep them secret. A multi-encryption scheme is an elegant solution for
منابع مشابه
Custos: Increasing Security with Secret Storage as a Service
In the age of cloud computing, securely storing, tracking, and controlling access to digital “secrets” (e.g. private cryptographic keys, hashed passwords, etc) is a major challenge for developers, administrators, and end-users alike. Yet, the ability to securely store such secrets is critical to the security of the web-connected applications on which we rely. We believe many of the traditional ...
متن کاملProtecting Cryptographic Secrets and Processes
Modern commodity operating systems are increasingly used to perform cryptographic operations such as digital signatures and to store cryptographic keys and data which the user considers private. Even when this data is encrypted, as is the recommended best practice, the encryption keys themselves are not wellprotected. We examine the problem of protecting cryptographic secrets and cryptographic ...
متن کاملWindows XP annoyances for geeks - tips, secrets and solutions: covers service pack 2 (2 ed.)
Where you can find the windows xp annoyances for geeks tips secrets and solutions easily? Is it in the book store? On-line book store? are you sure? Keep in mind that you will find the book in this site. This book is very referred for you because it gives not only the experience but also lesson. The lessons are very valuable to serve for you, that's not about who are reading this windows xp ann...
متن کاملBook Review: Super Searcher author scribe: successful writers share their Internet research secrets
If you get the printed book in on-line book store, you may also find the same problem. So, you must move store to store and search for the available there. But, it will not happen here. The book that we will offer right here is the soft file concept. This is what make you can easily find and get this super searcher author scribe successful writers share their internet research secrets by readin...
متن کاملProtecting Sensitive Data on a PC by a Custom Algorithm
To store secrets and sensitive data in secure ways is necessary in the modern life. Since most hardware technologies used to store sensitive data are expensive for a single user, it is very common to store this kind of data by the means of software or software implemented encryption procedures. If for example the secret to protect is the secret key in a Public Key Infrastructure environment it ...
متن کاملSecrets of Light in Traditional Houses of Iran
In addition to attention to natural light as a renewable, costless and environment-friendly source of energy in the late 20th century, numerous studies have been conducted into the effect of natural light on human being’s soul and body and all such studies reiterate the undeniable role of natural lighting on people’s behavior, attitudes, and efficiency. However, in spite of the awareness of the...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2012 شماره
صفحات -
تاریخ انتشار 2012