Secure protocols for accountable warrant execution
نویسندگان
چکیده
We describe cryptographic protocols for secure execution of warrants or legal orders authorizing access to data held by private parties. Using cryptography enables a better combination of security, privacy, and accountability properties than would otherwise be possible. We describe a series of protocols, based on different assumptions about trust and technical sophistication of the parties, and making use of wellstudied cryptographic tools. We report benchmark results from our prototype implementation of the tools involved in one such protocol, and show that the protocol’s entire computational cost is easily feasible even for very large data sets, such as “cloud” software service or telecommunications databases comprising billions of records.
منابع مشابه
Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC
Key agreement protocols are essential for secure communications in open and distributed environments. Recently, identity-based key agreement protocols have been increasingly researched because of the simplicity of public key management. The basic idea behind an identity-based cryptosystem is that a public key is the identity (an arbitrary string) of a user, and the corresponding private key is ...
متن کاملA Mobile and Fog-based Computing Method to Execute Smart Device Applications in a Secure Environment
With the rapid growth of smart device and Internet of things applications, the volume of communication and data in networks have increased. Due to the network lag and massive demands, centralized and traditional cloud computing architecture are not accountable to the high users' demands and not proper for execution of delay-sensitive and real time applications. To resolve these challenges, we p...
متن کاملA New Anonymous but Accountable Secure Proxy Signature Scheme
Privacy has become one of the most important human rights of the modern age. In order to verify the validity of the proxy signature, the verifier need get the original signers’ public key and the proxy signer’s public key. Obviously, the verification would leak the relationship between the proxy signer and the original signer. Using the technology of pseudonym, in this paper, we propose a simpl...
متن کاملA traceable optimistic fair exchange protocol in the standard model
An Optimistic Fair Exchange (OFE) protocol is a good way for two parties to exchange their digital items in a fair way such that at the end of the protocol execution, both of them receive their items or none of them receive anything. In an OFE protocol there is a semi-trusted third party, named arbitrator, which involves in the protocol if it is necessary. But there is a security problem when a...
متن کاملProtocols for Secure Multi-party Computation: Design, Implementation and Performance Evaluation
Protocols for secure multi-party computation allow participants to share a computation while each party learns only what can be inferred from their own inputs and the output of the computation. However, the execution time of a secure protocol may be too high so that it is not practical unless some tradeoffs being made between data access and confidentiality. In this technical report, we propose...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014