[Resource Topic] 2005/284: Foundations and Applications for Secure Triggers

Welcome to the resource topic for 2005/284

Foundations and Applications for Secure Triggers

Authors: Ariel Futoransky, Emiliano Kargieman, Carlos Sarraute, Ariel Waissbein


Imagine there is certain content we want to maintain private until
some particular event occurs, when we want to have it automatically
Suppose furthermore, that we want this done in a (possibly) malicious host.
Say, the confidential content is a piece of code belonging to a computer
program that should remain ciphered and then be triggered'' (i.e., deciphered and executed) when the underlying system satisfies a preselected condition which must remain secret after code inspection. In this work we present different solutions for problems of this sort, using different declassification’’ criteria, based on a primitive we call {\em secure
We establish the notion of secure triggers in the universally-composable
security framework of [Canetti~2001] and introduce several examples. Our
examples demonstrate that a new sort of obfuscation is possible.
Finally, we motivate its use with applications in realistic scenarios.

ePrint: https://eprint.iacr.org/2005/284

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .