SoK: Authenticated Prefix Relations – A Unified Perspective On Relative Time-Stamping and Append-Only Logs

08/26/2023
by   Aljoscha Meyer, et al.
0

Secure relative timestamping and secure append-only logs are two historically mostly independent lines of research, which we show to be sides of the same coin – the authentication of prefix relations. From this more general viewpoint, we derive several complexity criteria not yet considered in previous literature. We define transitive prefix authentication graphs, a graph class that captures all hash-based timestamping and log designs we know of. We survey existing schemes by expressing them as transitive prefix authentication graphs, which yields more compact definitions and more complete evaluations than in the existing literature.

READ FULL TEXT
research
08/29/2023

Better Prefix Authentication

We present new schemes for solving prefix authentication and secure rela...
research
10/12/2019

On the equivalence of authentication codes and robust (2,2)-threshold schemes

In this paper, we show a "direct" equivalence between certain authentica...
research
11/13/2020

Information-theoretically secure data origin authentication with quantum and classical resources

In conventional cryptography, information-theoretically secure message a...
research
11/21/2019

Zero Knowledge Proof based authentication protocol using graph isomorphism

We live in an era of information and it is very important to handle the ...
research
06/27/2022

FIDO2 With Two Displays-Or How to Protect Security-Critical Web Transactions Against Malware Attacks

With the rise of attacks on online accounts in the past years, more and ...
research
06/29/2022

Effect of Auditory Stimuli on Electroencephalography-based Authentication

Opposed to standard authentication methods based on credentials, biometr...

Please sign up or login with your details

Forgot password? Click here to reset