The wonderful thing about triggers is triggers are wonderful things
Secure Triggers
-
Upload
karyn-short -
Category
Documents
-
view
22 -
download
0
description
Transcript of Secure Triggers
![Page 1: Secure Triggers](https://reader035.fdocuments.in/reader035/viewer/2022072014/56812d14550346895d91f6e1/html5/thumbnails/1.jpg)
Secure TriggersAriel Futoransky, Emiliano Kargieman,
Carlos Sarraute, Ariel Waissbein
Core Security Technologies
{ek,wata}@coresecurity.com
![Page 2: Secure Triggers](https://reader035.fdocuments.in/reader035/viewer/2022072014/56812d14550346895d91f6e1/html5/thumbnails/2.jpg)
Definitions
• Let S be a secret and P={p} a family of predicates.Let p be a predicate in P
• Def: A trigger is an algorithm T(S,p) that takes any input x in {0,1}* and returns S iff p(x)=true.Else, it returns nothing.
• Def: The trigger T(S,p) is said secure if a polynomial-time attacker, given P, the sampling distribution, and arbitrary access to T(S,p), cannot learn anything about S.
![Page 3: Secure Triggers](https://reader035.fdocuments.in/reader035/viewer/2022072014/56812d14550346895d91f6e1/html5/thumbnails/3.jpg)
Examples (1): Simple Trigger
• If the input x is equal to a private value y, then the Secret S is released.
T(S,“x=y?")
x = y? S
![Page 4: Secure Triggers](https://reader035.fdocuments.in/reader035/viewer/2022072014/56812d14550346895d91f6e1/html5/thumbnails/4.jpg)
Examples (2): Multiple Strings Trigger
• If the input set X={x1,…,xn} includes a private set Y ={y1,…,yt}, then the Secret S is released.
T(S,“XY?")x1 ?
S……
xn
y1…
yn
![Page 5: Secure Triggers](https://reader035.fdocuments.in/reader035/viewer/2022072014/56812d14550346895d91f6e1/html5/thumbnails/5.jpg)
Examples (3): Subsequence Trigger
• If xi1 = y1, …, xit = yt, then the secret S is released. – Where both {yj}, and {ik} are private.
T(S,“(xjk)=(yk)?")x
xi1
![Page 6: Secure Triggers](https://reader035.fdocuments.in/reader035/viewer/2022072014/56812d14550346895d91f6e1/html5/thumbnails/6.jpg)
Examples (3): Subsequence Trigger
• If xi1 = y1, …, xit = yt, then the secret S is released. – Where both {yj}, and {ik} are private.
T(S,“(xjk)=(yk)?")x
xi1
xi2
![Page 7: Secure Triggers](https://reader035.fdocuments.in/reader035/viewer/2022072014/56812d14550346895d91f6e1/html5/thumbnails/7.jpg)
Examples (3): Subsequence Trigger
• If xi1 = y1, …, xit = yt, then the secret S is released. – Where both {yj}, and {ik} are private.
T(S,“(xjk)=(yk)?")x
…
xit
xi1
xi2
![Page 8: Secure Triggers](https://reader035.fdocuments.in/reader035/viewer/2022072014/56812d14550346895d91f6e1/html5/thumbnails/8.jpg)
Examples (3): Subsequence Trigger
• If xi1 = y1, …, xit = yt, then the secret S is released. – Where both {yj}, and {ik} are private.
T(S,“(xjk)=(yk)?")x
? Sy1
…
yt
=
=
x
…
xit
xi1
xi2 y2=
![Page 9: Secure Triggers](https://reader035.fdocuments.in/reader035/viewer/2022072014/56812d14550346895d91f6e1/html5/thumbnails/9.jpg)
Applications of the triggers
• Information Warfare WormAttack
• Online automated shopping
• Other– Software protection– …
![Page 10: Secure Triggers](https://reader035.fdocuments.in/reader035/viewer/2022072014/56812d14550346895d91f6e1/html5/thumbnails/10.jpg)
Results
• Generic definitions of security for Secure Triggers on the UCS framework
• Instantiations:• Simple triggers are secure
• Multiple strings triggers are secure
• Subsequence triggers are secure
• Paper submitted for publication,let us know if you want a copy