An Oblivious Data Structure and its Applications to Cryptography

نویسنده

  • Daniele Micciancio
چکیده

We introduce the notion of oblivious data structure, motivated by the use of data structures in cryptography. Informally, an oblivious data structure yields no knowledge about the sequence of operations that have been applied to it other than the nal result of the operations. In particular we de ne oblivious 2-3 trees and update algorithms to insert and delete sequences of contiguous leaves, in such a way that the only information conveyed by an oblivious 2-3 tree is the set of values stored at its leaves. This property is achieved through the use of randomization by the update algorithms. We use oblivious 2-3 trees to solve the open problem of \private" incremental digital signatures raised by Bellare, Goldreich and Goldwasser (1995). A digital signature system is incremental if a document for which a digital signature has been produced can be edited and its digital signature can be e ciently updated to re ect the changes in the document. An incremental signature system is private if the digital signature produced by the system for the nal version of a document that has undergone a sequence of edit operations, does not yield any information on intermediate versions of the document.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Document Edit Edit Edit Digitalsignature Incrementalsigning Algorithm Standardsigning Algorithm

We introduce the notion of oblivious data structure, motivated by the use of data structures in cryptography. Informally, an oblivious data structure yields no knowledge about the sequence of operations that have been applied to it other than the nal result of the operations. In particular we deene Oblivious Tree, a data structure very similar to 2-3 Tree, but with the additional property that ...

متن کامل

Efficient Oblivious Transfer Protocols based on White-Box Cryptography

Oblivious transfer protocol is an important cryptographic primitive having numerous applications and particularly playing an essential role in secure multiparty computation protocols. On the other hand existing oblivious transfer protocols are based on computationally expensive public-key operations which remains the main obstacle for employing such protocols in practical applications. In this ...

متن کامل

A Language for Probabilistically Oblivious Computation

An oblivious computation is one that is free of direct and indirect information leaks, e.g., due to observable differences in timing and memory access patterns. This paper presents Lobliv, a core language whose type system enforces obliviousness. Prior work on type-enforced oblivious computation has focused on deterministic programs. Lobliv is new in its consideration of programs that implement...

متن کامل

ZeroTrace : Oblivious Memory Primitives from Intel SGX

We are witnessing a confluence between applied cryptography and secure hardware systems in enabling secure cloud computing. On one hand, work in applied cryptography has enabled efficient, oblivious data-structure and memory primitives. On the other, secure hardware and the emergence of Intel SGX has enabled a low-overhead and mass market mechanism for isolated execution. By themselves these te...

متن کامل

Towards Wireless Security without Computational Assumptions —An Oblivious Transfer Protocol Based on an Unauthenticated Wireless Channel

Wireless security has been an active research area since the last decade. A lot of studies of wireless security use cryptographic tools, but traditional cryptographic tools are normally based on computational assumptions, which may turn out to be invalid in the future. Consequently, it is very desirable to build cryptographic tools that do not rely on computational assumptions. In this paper, w...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1997