Privacy-preserving outsourcing of brute-force key searches
dc.contributor.author
Karame, Ghassan O.
dc.contributor.author
Capkun, Srdjan
dc.contributor.author
Maurer, Ueli
dc.date.accessioned
2017-07-06T13:19:06Z
dc.date.available
2017-06-10T19:33:46Z
dc.date.available
2017-07-06T13:19:06Z
dc.date.issued
2010
dc.identifier.uri
http://hdl.handle.net/20.500.11850/69838
dc.identifier.doi
10.3929/ethz-a-006851009
dc.description.abstract
In this work, we investigate the privacy-preserving properties of encryption algorithms in the special case where encrypted data might be brute-force decrypted in a distributed setting. For that purpose, we consider a problem where a supervisor holds a ciphertext and wants to search for the corresponding key assisted by a set of helper nodes, without the nodes learning any information about the plaintext or the decryption key. We call this a privacy-preserving cryptographic key search. We provide a model for privacy-preserving cryptographic searches and we introduce two types of privacy-preserving key search problems: plaintext-hiding and key-hiding cryptographic search. We show that a number of private-key and public-key encryp- tion schemes enable the construction of efficient privacy- preserving solvers for plaintext hiding searches. We also discuss possible constructions of privacy-preserving solvers for key-hiding cryptographic searches. Our results highlight the need to consider the property of enabling efficient privacy-preserving solvers as an additional criterion for choosing which cryptographic algorithm to use.
en_US
dc.format
application/pdf
dc.language.iso
en
en_US
dc.publisher
ETH, Department of Computer Science
en_US
dc.rights.uri
http://rightsstatements.org/page/InC-NC/1.0/
dc.title
Privacy-preserving outsourcing of brute-force key searches
en_US
dc.type
Report
dc.rights.license
In Copyright - Non-Commercial Use Permitted
dc.date.published
2011
ethz.journal.title
Technical Report / ETH Zurich, Department of Computer Science
ethz.journal.volume
662
en_US
ethz.size
12 p.
en_US
ethz.code.ddc
DDC - DDC::0 - Computer science, information & general works::004 - Data processing, computer science
en_US
ethz.notes
Technical Reports D-INFK.
en_US
ethz.identifier.nebis
006851009
ethz.publication.place
Zürich
en_US
ethz.publication.status
published
en_US
ethz.leitzahl
ETH Zürich::00002 - ETH Zürich::00012 - Lehre und Forschung::00007 - Departemente::02150 - Dep. Informatik / Dep. of Computer Science
en_US
ethz.date.deposited
2017-06-10T19:34:36Z
ethz.source
ECOL
ethz.source
ECIT
ethz.identifier.importid
imp59366b1aace0320387
ethz.identifier.importid
imp593650d4cf24810362
ethz.ecolpid
eth:5070
ethz.ecitpid
pub:110594
ethz.eth
yes
en_US
ethz.availability
Open access
en_US
ethz.rosetta.installDate
2017-07-06T13:19:47Z
ethz.rosetta.lastUpdated
2025-02-06T23:01:54Z
ethz.rosetta.versionExported
true
ethz.COinS
ctx_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.atitle=Privacy-preserving%20outsourcing%20of%20brute-force%20key%20searches&rft.jtitle=Technical%20Report%20/%20ETH%20Zurich,%20Department%20of%20Computer%20Science&rft.date=2010&rft.volume=662&rft.au=Karame,%20Ghassan%20O.&Capkun,%20Srdjan&Maurer,%20Ueli&rft.genre=report&
Files in this item
Publication type
-
Report [6958]