Proceedings ArticleDOI
Incremental cryptography and application to virus protection
Mihir Bellare,Oded Goldreich,Shafi Goldwasser +2 more
- pp 45-56
TLDR
The goal ofincremental cryptography is to design cryptographic algorithms with the property that having applied the algorithm to a document, it is possible to quickly update the result of the algorithm for a modifled document, rather than having to re-compute it from scratch.Abstract:
The goal ofincremental cryptography is to design cryptographic algorithms with the property that having applied the algorithm to a document, it is possible to quickly update the result of the algorithm for a modifled document, rather than having to re-compute it from scratch. In settings where cryptographic algorithms such as encryption or signatures are frequently applied to changing documents, dramatic e‐ciency improvements can be achieved. One such setting is the use of authentication tags for virus protection. We consider documents that can be modifled by powerful (and realistic) document modiflcation operations such as insertion and deletion of character-strings (or equivalently cut and paste of text). We provide e‐cient incremental signature and message authentication schemes supporting the above document modiflcation operations. They meet a strong notion of tamper-proof security which is appropriate for the virus protection setting. We initiate a study of incremental encryption, providing deflnitions as well as solutions. Finally, we raise the novel issue of \privacy" of incremental authentication schemes.read more
Citations
More filters
Book ChapterDOI
Homomorphic Signature Schemes
TL;DR: In this article, the authors introduce basic definitions of security for homomorphic signature systems, motivate the inquiry with example applications, and describe several schemes that are homomorphic with respect to useful binary operations.
Journal ArticleDOI
Certificate revocation and certificate update
Moni Naor,Kobbi Nissim +1 more
TL;DR: In this article, the authors present a solution for the problem of certificate revocation, which represents certificate revocation lists by authenticated dictionaries that support efficient verification whether a certificate is in the list or not and efficient updates (adding/removing certificates from the list).
Patent
Multi-tiered incremental software updating
Ray Waldin,Carey Nachenberg +1 more
TL;DR: In this article, a software application (110) is updated to a newer version by means of incremental update patches (122), each containing that information necessary to transform one version of an application to another version.
Journal ArticleDOI
Towards secure mobile cloud computing: A survey
TL;DR: This literature review highlights the current state of the art work proposed to secure mobile cloud computing infrastructures, identifies the potential problems, and provides a taxonomy of the state-of-the- art.
Journal ArticleDOI
Beyond lightning: A survey on security challenges in cloud computing
TL;DR: It is emphasized that although there are many technological approaches that can improve cloud security, there are currently no one-size-fits-all solutions, and future work has to tackle challenges such as service level agreements for security, as well as holistic mechanisms for ensuring accountability in the cloud.
References
More filters
Book
The Design and Analysis of Computer Algorithms
Alfred V. Aho,John E. Hopcroft +1 more
TL;DR: This text introduces the basic data structures and programming techniques often used in efficient algorithms, and covers use of lists, push-down stacks, queues, trees, and graphs.
Proceedings Article
The MD5 Message-Digest Algorithm
TL;DR: This document describes the MD5 message-digest algorithm, which takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input.
Journal ArticleDOI
A digital signature scheme secure against adaptive chosen-message attacks
TL;DR: A digital signature scheme based on the computational difficulty of integer factorization possesses the novel property of being robust against an adaptive chosen-message attack: an adversary who receives signatures for messages of his choice cannot later forge the signature of even a single additional message.
Journal ArticleDOI
Universal classes of hash functions
TL;DR: An input independent average linear time algorithm for storage and retrieval on keys that makes a random choice of hash function from a suitable class of hash functions.