Published: November 26, 2018
Author(s)
John Kelsey (NIST)
Conference
Name: 4th International Conference on Research in Security Standardisation (SSR 2018)
Dates: November 26-27, 2018
Location: Darmstadt, Germany
Citation: Security Standardisation Research, Lecture Notes in Computer Science vol. 11322, pp. 164-184
We discuss the development of a new format for beacons—servers which provide a sequence of digitally signed and hash-chained public random numbers on a fixed schedule. Users of beacons rely on the trustworthiness of the beacon operators. We consider several possible attacks on the users by the beacon operators, and discuss defenses against those attacks that have been incorporated into the new beacon format. We then analyze and quantify the effectiveness of those defenses.
We discuss the development of a new format for beacons—servers which provide a sequence of digitally signed and hash-chained public random numbers on a fixed schedule. Users of beacons rely on the trustworthiness of the beacon operators. We consider several possible attacks on the users by the...
See full abstract
We discuss the development of a new format for beacons—servers which provide a sequence of digitally signed and hash-chained public random numbers on a fixed schedule. Users of beacons rely on the trustworthiness of the beacon operators. We consider several possible attacks on the users by the beacon operators, and discuss defenses against those attacks that have been incorporated into the new beacon format. We then analyze and quantify the effectiveness of those defenses.
Hide full abstract
Keywords
randomness; public randomness; cryptography; trusted third party
Control Families
None selected