The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
Proceedings of the 6th Edition of the ACM Workshop on Cloud Computing Security 2014
DOI: 10.1145/2664168.2664175
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Certification and Zero-Knowledge Proofs of Knowledge on Infrastructure Topology Graphs

Abstract: Digital signature schemes are a foundational cryptographic building block in certification and the projection of trust. Based on a signature scheme on committed graphs, we propose a framework of certification and proof methods to sign topology graphs and to prove properties of their certificates in zero-knowledge. This framework allows an issuer, such as an auditing system, to sign the topology representation of an infrastructure. The prover, such as an infrastructure provider, can then convince a verifier of … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
13
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(13 citation statements)
references
References 37 publications
0
13
0
Order By: Relevance
“…Their application allows an auditor to analyse the configuration of a cloud, and to issue a signature on its topology (or a sequence of signatures on dynamically changing topologies). [7]. The signature encodes the topology as a graph in a special way, such that the cloud provider can prove high-level security properties such as isolation of tenants to verifiers.…”
Section: Cryptographic Toolsmentioning
confidence: 99%
See 1 more Smart Citation
“…Their application allows an auditor to analyse the configuration of a cloud, and to issue a signature on its topology (or a sequence of signatures on dynamically changing topologies). [7]. The signature encodes the topology as a graph in a special way, such that the cloud provider can prove high-level security properties such as isolation of tenants to verifiers.…”
Section: Cryptographic Toolsmentioning
confidence: 99%
“…A more elaborate version of this scenario was presented in [7]. Figure 3 depicts the system model for the topology certification.…”
Section: Day 2-deep Dive On Cryptography: Graph Signatures and Topolomentioning
confidence: 99%
“…In this context, in [13,14], the graph structure is focused, and the signatures and zero-knowledge proofs for graphs are proposed. In the proposed system, an issuer generates a signature certifying the topology of an undirected graph, and issues a prover the signature.…”
Section: Introductionmentioning
confidence: 99%
“…In [13], as the application, a trusted third party auditing system on a distributed system of virtualized infrastructure is considered. In this system, an auditor, an infrastructure provider and tenants participate.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation