Secure Cryptographic Precomputation with Insecure Memory pdfauthor
نویسندگان
چکیده
We propose a solution that provides secure storage for cryptographic precomputation using only insecure memory that is susceptible to eavesdropping and tampering. Specifically, we design a small tamper-resistant hardware module, the Queue Security Proxy (QSP), that situates transparently on the data-path between the processor and the insecure memory. Our analysis shows that our design is secure and flexible, and yet efficient and inexpensive. In particular, both the timing overhead and the hardware cost of our solution are independent of the storage size.
منابع مشابه
Amortized Sublinear Secure Multi Party Computation
We study the problem of secure two-party and multi-party computation in a setting where some of the participating parties hold very large inputs. Such settings increasingly appear when participants wish to securely query a database server, a typical situation in cloud related applications. Classic results in secure computation require work that grows linearly with the size of the input, while i...
متن کاملاثر مسئولیتپذیری بر سوگیری و اطمینان به حافظه در بیماران مبتلا به وسواس وارسی
AbstractObjectives: Considering the importance of memory problems in the development and maintenance of obsessive-compulsive disorder, the present study has been carried out with the goal of evaluating a number of memory functions in patients with the mentioned disorder. Method: In order to study memory bias and confidence, and the effects of responsibility on them in patients with checking obs...
متن کاملA Calculus for Secure Channel Establishment in Open Networks
This paper presents a calculus of channel security properties which allows to analyze and compare protocols for establishing secure channels in an insecure open network at a high level of abstraction. A channel is characterized by its direction, time of availability and its security properties. Cryptographic primitives and trust relations are interpreted as transformations for channel security ...
متن کاملSocial Adjustment and Academic Achievement of Female Children with Secure and Insecure Attachment Patterns
Social Adjustment and Academic Achievement of Female Children with Secure and Insecure Attachment Patterns E. Ghorbanian, M.A. T. PourEbrahim, Ph.D. P.S. Seyed Mousavi, Ph.D. M. Habibi, Ph.D. This study was undertaken to compare social adjustment and academic achievement of female children with secure and insecure attachment patterns. The research type was descript...
متن کاملFormal verification of cryptographic protocols with automated reasoning
Cryptographic protocols form the backbone of our digital society. Unfortunately, the security of numerous critical components has been neglected. As a consequence, attacks have resulted in financial loss, violations of personal privacy, and threats to democracy. This thesis aids the secure design of cryptographic protocols and facilitates the evaluation of existing schemes. Developing a secure ...
متن کامل