Secure Protocols with Asymmetric Trust
نویسندگان
چکیده
In the standard general-adversary model for multi-party protocols, a global adversary structure is given, and every party must trust in this particular structure. We introduce a more general model, the asymmetric-trust model, wherein every party is allowed to trust in a different, personally customized adversary structure. We have two main contributions. First, we present non-trivial lower and upper bounds for broadcast, verifiable secret sharing, and general multi-party computation in different variations of this new model. The obtained bounds demonstrate that the new model is strictly more powerful than the standard general-adversary model. Second, we propose a framework for expressing and analyzing asymmetric trust in the usual simulation paradigm for defining security of protocols, and in particular show a general composition theorem for protocols with asymmetric trust.
منابع مشابه
David and Goliath Commitments: UC Computation for Asymmetric Parties Using Tamper-Proof Hardware
Designing secure protocols in the Universal Composability (UC) framework confers many advantages. In particular, it allows the protocols to be securely used as building blocks in more complex protocols, and assists in understanding their security properties. Unfortunately, most existing models in which universally composable computation is possible (for useful functionalities) require a trusted...
متن کاملSecuring Wireless Sensor Networks with Public Key Techniques
A secure protocol for spontaneous wireless ad hoc networks which uses an hybrid symmetric/ asymmetric scheme and the trust between users in order to exchange the initial data and to exchange the secret keys that will be used to encrypt the data. Trust is based on the first visual contact between users. Our proposal is a complete self-configured secure protocol that is able to create the network...
متن کاملAdvanced techniques for dispute resolving and authorship proofs on digital works
Digital watermarking is a promising technology for protecting intellectual property rights on digital content. Resolving authorship-disputes was one of the first and most propelling applications of robust digital watermarks, and much research effort has gone into protocols for resolving authorship-disputes by means of digital watermarks. Unfortunately, previous proposals lack formal definitions...
متن کاملSecure Routing Using Factual Correctness
The routing protocols in use today operate on implicit trust among the different routers. Specifically, the distance vector routing (DVR) protocols compute routing tables in a distributed manner, based on this implicit trust. This trust model however fails to ensure the factual correctness of the routing updates, which is very critical for secure routing. We propose a neighbor update propagatio...
متن کاملA Survey of Trust Based AODV Routing Protocols in MANETS
Mobile Adhoc Networks are type of wireless network which are infrastructure less, self organizing, highly mobile and quickly deployable. There is no central authority, the communication occur hop by hop based on cooperation among the nodes. Thus, secure routing protocols are needed which are robust and ensure that the nodes in the network behave in trustworthy manner otherwise detect and elimin...
متن کامل