Welcome to the resource topic for 2005/284
Title:
Foundations and Applications for Secure Triggers
Authors: Ariel Futoransky, Emiliano Kargieman, Carlos Sarraute, Ariel Waissbein
Abstract:Imagine there is certain content we want to maintain private until
some particular event occurs, when we want to have it automatically
disclosed.
Suppose furthermore, that we want this done in a (possibly) malicious host.
Say, the confidential content is a piece of code belonging to a computer
program that should remain ciphered and then be triggered'' (i.e., deciphered and executed) when the underlying system satisfies a preselected condition which must remain secret after code inspection. In this work we present different solutions for problems of this sort, using different
declassification’’ criteria, based on a primitive we call {\em secure
triggers}.
We establish the notion of secure triggers in the universally-composable
security framework of [Canetti~2001] and introduce several examples. Our
examples demonstrate that a new sort of obfuscation is possible.
Finally, we motivate its use with applications in realistic scenarios.
ePrint: https://eprint.iacr.org/2005/284
See all topics related to this paper.
Feel free to post resources that are related to this paper below.
Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.
For more information, see the rules for Resource Topics .