CRUST: cryptographic remote untrusted storage without public keys
نویسندگان
چکیده
منابع مشابه
SiRiUS: Securing Remote Untrusted Storage
This paper presents SiRiUS, a secure file system designed to be layered over insecure network and P2P file systems such as NFS, CIFS, OceanStore, and Yahoo! Briefcase. SiRiUS assumes the network storage is untrusted and provides its own read-write cryptographic access control for file level sharing. Key management and revocation is simple with minimal out-of-band communication. File system fres...
متن کاملPico Without Public Keys
Pico is a user authentication system that does not require remembering secrets. It is based on a personal handheld token that holds the user’s credentials and that is unlocked by a “personal aura” generated by digital accessories worn by the owner. The token, acting as prover, engages in a public-key-based authentication protocol with the verifier. What would happen to Pico if success of the my...
متن کاملAuthentication on Untrusted Remote Hosts with Public-Key Sudo
Tw o common tools in Linuxand UNIX-based environments are SSH for secure communications and sudo for performing administrative tasks. These are independent programs with substantially different purposes, but they are often used in conjunction. In this paper, we describe a weakness in their interaction and present our solution, public-key sudo. Public-key sudo1 is an extension to the sudo authen...
متن کاملSafeguarding cryptographic keys
Certain cryptographic keys, such as a number which makes it possible to compute the secret decoding exponent in an RSA public key cryptosystem,1,5 or the system master key and certain other keys in a DES cryptosystem,3 are so important that they present a dilemma. If too many copies are distributed one might go astray. If too few copies are made they might all be destroyed. A typical cryptosyst...
متن کاملPublic Keys and Private Keys
This work is about developing tools for secure communications using quantum protocols. The work focuses on ways to transfer classical information using quantum communication channels, and exploiting the properties of quantum information theory to achieve secrecy. Quantum cryptography and classical cryptography essentially deal with the same tasks, such as, just to mention a few, private communi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Information Security
سال: 2009
ISSN: 1615-5262,1615-5270
DOI: 10.1007/s10207-009-0081-6