Skip to main content

Showing 1–4 of 4 results for author: Poettering, B

Searching in archive cs. Search in all archives.
.
  1. arXiv:2112.09411  [pdf

    cs.CR

    Towards Intelligent Context-Aware 6G Security

    Authors: André N. Barreto, Stefan Köpsell, Arsenia Chorti, Bertram Poettering, Jens Jelitto, Julia Hesse, Jonathan Boole, Konrad Rieck, Marios Kountouris, Dave Singelee, Kumar Ashwinee

    Abstract: Imagine interconnected objects with embedded artificial intelligence (AI), empowered to sense the environment, see it, hear it, touch it, interact with it, and move. As future networks of intelligent objects come to life, tremendous new challenges arise for security, but also new opportunities, allowing to address current, as well as future, pressing needs. In this paper we put forward a roadmap t… ▽ More

    Submitted 17 December, 2021; originally announced December 2021.

  2. arXiv:2009.02667  [pdf, other

    cs.CR

    Efficiency Improvements for Encrypt-to-Self

    Authors: Jeroen Pijnenburg, Bertram Poettering

    Abstract: Recent work by Pijnenburg and Poettering (ESORICS'20) explores the novel cryptographic Encrypt-to-Self primitive that is dedicated to use cases of symmetric encryption where encryptor and decryptor coincide. The primitive is envisioned to be useful whenever a memory-bounded computing device is required to encrypt some data with the aim of temporarily depositing it on an untrusted storage device. W… ▽ More

    Submitted 6 September, 2020; originally announced September 2020.

    Comments: this is the full version of content that appears at CYSARM'20

  3. arXiv:1608.08386  [pdf, ps, other

    cs.CR

    Cryptographic Enforcement of Information Flow Policies without Public Information via Tree Partitions

    Authors: Jason Crampton, Naomi Farley, Gregory Gutin, Mark Jones, Bertram Poettering

    Abstract: We may enforce an information flow policy by encrypting a protected resource and ensuring that only users authorized by the policy are able to decrypt the resource. In most schemes in the literature that use symmetric cryptographic primitives, each user is assigned a single secret and derives decryption keys using this secret and publicly available information. Recent work has challenged this appr… ▽ More

    Submitted 30 August, 2016; originally announced August 2016.

    Comments: Extended version of conference papers from ACNS 2015 and DBSec 2015

  4. arXiv:1410.5567  [pdf, ps, other

    cs.CR

    Cryptographic Enforcement of Information Flow Policies without Public Information

    Authors: Jason Crampton, Naomi Farley, Gregory Gutin, Mark Jones, Bertram Poettering

    Abstract: Cryptographic access control has been studied for over 30 years and is now a mature research topic. When symmetric cryptographic primitives are used, each protected resource is encrypted and only authorized users should have access to the encryption key. By treating the keys themselves as protected resources, it is possible to develop schemes in which authorized keys are derived from the keys expl… ▽ More

    Submitted 30 May, 2015; v1 submitted 21 October, 2014; originally announced October 2014.

    Comments: To appear in Proceedings of ACNS 2015