




版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
Opportuni)esforinnova)oninOxfordUniversityandChie7inLab,Shenzhengesmicroprocessorssecuritymilitarysystemsdevelopment.WorkingonSecuritysinceonFinTechsince.eadofOxfordComputerSciencemakingitintoalargegeneralCSdepartmentrated3rdintheworld.•Recentlytookpar@alre@rementfromOxfordandseTngupChie7inLabhereinShenzhen.Chie<inLab•CentredonFinTech.•BuildingIPthatcanbelicencedorspunout.morejuniorresearchers.•BuildingteamsinPayment,BlockchainandBigData.ncedfourpatentsfromOxfordmiddle.cryptographicsignature.bleHISPseliminanganaackvectorfromaclassofcryptoprotocols.4.AuditablePAKEsandstochas@cfairexchange:anexci@ngnewapproachtomakingtransac@onssafeandsecure.WearedevelopingmuchnewIPappingtechniquesforpostquantumandIoTNovelPQsignatureschemeogynologyeenhonestmistakesandaacks4.Lossofservicefrompasswordguessinga]acksplicableInspira)on•PAKEs:twopar@estryingtobuildasecurechannelontopofapasswordthatdoesnothaveenoughcontenttobeakey.Searchablegiventheopportunity.uldshedoellhavemadeamistakeeitherrememberedwrongpasswordormiss-typed).•Soifsheraisesthealarmforana]ack,shewillo7enberound.•Wewantameansofpreven@ngBobfrommakinghonestmistakes,atleastonesthatwillgetasfarasAliceforchecking.•Giveeachpasswordacriterionbasedonitspurposethatithastosa@sfy,andhelpAliceandBobchooseonethatdoes.onwillbebasedonasignatureforthepurposeforwhichitis“Alice’sinternetbankingpasswordforBarclays”,“Bob’sOxfordSSOpassword”ionforpasswordpwillbesomethinglikehashpsCwhereCisatagivenpercentageofrandomstringswillpasssayiteratedhashing).•Bob’spasswordsfordifferentpurposeswillallbedifferent.akesanhonestmistakesuchastypinginhispasswordforsomethingelseitwillbepubliclydiagnosableasthis,andinaPAKEthecheckingwillnotinvolveAliceBayesianprobabilitytellsusthataguessthatdoesmeetthecriterionismuchmorelikelytocomefromana]acker.Falseposi@vea]ackswillbe1%or0.1%ascommonaswithordinarytechnology.•Inthecaseofadistributedpasswordguessinga]ack,eitheritwillbemuchmoreexpensivetomountoralmostalloftheguesseswillbefilteredoutbeforereachingthecentralpasswordfile.•Weimaginethatuser(s)willenteraprototypepassword,whichwillbeasuitablemeasureofentropyandthenthetoolwillcalculate•Couldbechoosingasecondwordornumbertobeplacedatsomepoint.•Couldbereplacingcharactersinsomeway.•Obviouslyhastobedoneofflineorviaasecureservice.theentropythatwillbetakenawaybythetest,butpossiblymore.Ques)onsoflongerandmorevariedpasswordsstructureeterionmeanslongerpasswordsandlongertoconstructbalanceprototypesincludinghowtheyaffecthumanbehaviour.•Theseareusuallyvaria@onsofthediscretelogarithmproblemandbuildaquantumcomputer.•Wedonotknowwhenonewillbebuilt,butthisisarealproblemnow!•Weneedoursignaturestoremainreliable,andanysymmetrickeykwhichethodswillberevealedandhenceeverythingencryptedunderk.•Itisnotcomfortabletoknowthatyourcommunica@onsandrecordsfromtalldependonthesupposedintractabilityoftalldependonthesupposedintractabilityofcertain•Thismeansameansofsecuritythatwillnotbebrokenbyaquantumcomputer.trapdoors)thoughttobeproofagainstquantumcomputers.•ThebestcandidatescomefromlaTce-basedcryptography.•Cancreateverylargekeys,andno-onereallyunderstandswhatcanbedonewithaquantumcomputer.vulnerabletoquantumcomputersAndiftheyareweareinrealtrouble!)basiccrypto.Wehaveproposalsforbothsignatureandkeyagreement.ureesarecipientreasontobelievethatthemessagewascreatedbyaalteredintransit(integrity).Formally,adigitalsignatureschemeisatripleofprobabilisticpolynomialtimealgorithms,(G,S,V),satisfying:•G(key-generator)generatesapublickey,pk,andacorrespondingprivatekey,sk,oninput1n,wherenisthesecurityparameter.•S(signing)returnsatag,t,ontheinputs:theprivatekey,sk,andastring,x.•V(verifying)outputsacceptedorrejectedontheinputs:thepublickey,pk,astring,x,andatag,t.Forcorrectness,SandVmustsatisfyPr[(pk,sk)←G(1n),V(pk,x,S(sk,x))=accepted]=1.[9]Adigitalsignatureschemeissecureifforeverynon-uniformprobabilisticpolynomialtimeadversary,APr[(pk,sk)←G(1n),(x,t)←AS(sk,·)(pk,1n),x∉Q,V(pk,x,t)=accepted]<negl(n),whereAS(sk,·)denotesthatAhasaccesstotheoracle,S(sk,·),andQdenotesthesetofthequeriesonSmadebyA,whichknowsthepublickey,pk,andthesecurityparameter,n.hatwerequireanyadversarycannotdirectlyquerythestringxonSLet’scallthistheintensionaldefini@on:comeswithacleardefini@onabouthowitistobedone.forexampleLamport’ssignaturescheme.anuseeachpublickeysecretkeypaironlyonceandarefairlyelaborate.•Wewilldispensewiththedifferencebetweenpublicandsecretkeys.cleakeyissecretasuitablehashofitispublicanditselfwithaaboutwhenitwillordidchange.•WhileoneofA’skeysissecretAcansignanythingusingit.•Suchsignaturescanbecheckedoncethekeyispublic.•Akeycer@ficatenowtakestheform(hash(k,A,t),A,t),sign((A,hash(k,A,t),t),A’,t’)eaningthateitherthenodedoingthecheckingcanorthenodesoftheblockchainhasalreadycheck/edit.•WhereAhasreleasedacer@ficateforkeyvwithrelease@met,sign(X,A,t)=hash(X,v)andmustbeplacedontheblockchainbefore@met.ckAddtoconsensusmechanismdeoraCAcanmaintainAskeysbyaddingmorefuturekeysThatwayeachnodecanalwaysmaintainitssetoffuturekeys.•Extremelycheaptoimplement.
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 2025年上半年小学教学工作总结模版
- 红青色扁平牙齿健康模板
- 企业合伙投资合同标准文本
- 中考物理中的“不一定”总结模版
- 高一政治必修二知识点总结模版
- 医疗AI在远程医疗中的潜力与挑战
- 体校住宿合同范例
- 信誉合同范例
- 医养结合在老年健康管理中的应用
- 上海投资咨询合同范例
- 北京市顺义区2025年中考一模语文试卷(含答案)
- 室内设计毕业作业展板设计指南
- 生产委托运营合同协议
- 经济法第三版试卷及答案
- 古诗词诵读《拟行路难(其四) 》课件统编版高二语文选择性必修下册
- 《甲烷吸附储存技术》课件
- 汛期建筑施工安全课件
- 2025年北京市西城区九年级初三一模英语试卷(含答案)
- 道路维护保养项目投标方案(技术方案)
- 广东省深圳市2025年高三年级第二次调研考试数学试题(含答案)
- 山东省山东名校考试联盟2025年高三4月高考模拟考试物理试卷+答案
评论
0/150
提交评论