1 / 10

Secure Triggers

Secure Triggers. Ariel Futoransky, Emiliano Kargieman, Carlos Sarraute, Ariel Waissbein. Core Security Technologies. {ek,wata}@coresecurity.com. Definitions. Let S be a secret and P={p} a family of predicates. Let p be a predicate in P

karyn-short
Download Presentation

Secure Triggers

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Secure Triggers Ariel Futoransky, Emiliano Kargieman, Carlos Sarraute, Ariel Waissbein Core Security Technologies {ek,wata}@coresecurity.com

  2. Definitions • Let S be a secret and P={p} a family of predicates.Let p be a predicate in P • Def: A trigger is an algorithm T(S,p) that takes any input x in {0,1}* and returns S iff p(x)=true.Else, it returns nothing. • Def: The trigger T(S,p) is said secure if a polynomial-time attacker, given P, the sampling distribution, and arbitrary access to T(S,p), cannot learn anything about S.

  3. S Examples (1): Simple Trigger • If the input x is equal to a private value y, then the Secret S is released. T(S,“x=y?") ? x = y

  4. S Examples (2): Multiple Strings Trigger • If the input set X={x1,…,xn} includes a private set Y ={y1,…,yt}, then the Secret S is released. T(S,“XY?") x1 ? y1  … … … yn xn

  5. Examples (3): Subsequence Trigger • If xi1 = y1, …, xit = yt, then the secret S is released. • Where both {yj}, and {ik} are private. T(S,“(xjk)=(yk)?") x xi1

  6. Examples (3): Subsequence Trigger • If xi1 = y1, …, xit = yt, then the secret S is released. • Where both {yj}, and {ik} are private. T(S,“(xjk)=(yk)?") x xi1 xi2

  7. Examples (3): Subsequence Trigger • If xi1 = y1, …, xit = yt, then the secret S is released. • Where both {yj}, and {ik} are private. T(S,“(xjk)=(yk)?") x xi1 xi2 … xit

  8. S Examples (3): Subsequence Trigger • If xi1 = y1, …, xit = yt, then the secret S is released. • Where both {yj}, and {ik} are private. T(S,“(xjk)=(yk)?") x x ? xi1 y1 = xi2 y2 = … … xit yt =

  9. Applications of the triggers • Information Warfare WormAttack • Online automated shopping • Other • Software protection • …

  10. Results • Generic definitions of security for Secure Triggers on the UCS framework • Instantiations: • Simple triggers are secure • Multiple strings triggers are secure • Subsequence triggers are secure • Paper submitted for publication,let us know if you want a copy

More Related