An effective authentication for client application using ARM TrustZone
Version 2 2024-06-18, 10:31Version 2 2024-06-18, 10:31
Version 1 2018-09-27, 16:13Version 1 2018-09-27, 16:13
conference contribution
posted on 2024-06-18, 10:31authored byH Jiang, R Chang, L Ren, W Dong, L Jiang, S Yang
Private Polynomial Evaluation (PPE) allows the service provider to outsource the computation of a polynomial to some third party (e.g. the Cloud) in a verifiable way. And meanwhile, the polynomial remains hidden to the clients who are able to query the service. In ProvSec 2017, Bultel et al. have presented the formal security definitions for PPE, including polynomial protection (PP), proof unforgeability (UNF) and indistinguishability against chosen function attack (IND-CFA). They have introduced a PPE scheme that satisfies all these properties, and they have also shown that a polynomial commitment scheme in Asiacrypt 2010, called PolyCommit Ped
PolyCommitPed
, enjoys these properties as well. In this paper, we introduce another provably secure PPE scheme, which not only has computational advantages over these two existing ones, but also relies on a much weaker security assumption. Moreover, we further explore how our PPE scheme can be implemented in the distributed fashion, so that a number of third parties jointly respond to the query but none of them could learn the polynomial unless they all collude.
E Conference publication, E1 Full written paper - refereed
Copyright notice
2017, Springer
Editor/Contributor(s)
Liu J
Title of proceedings
ISPEC 2017 : Information security practice and experience : 13th International Conference, ISPEC 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings
Event
Information Security Practice and Experience. Conference (2017 : Melbourne, Victoria)
Publisher
Springer
Place of publication
Berlin, Germany
Series
Lecture notes in computer science, 0302-9743 ; 10701