Practical and Robust Secure Logging from Fault-Tolerant Sequential Aggregate Signatures

被引:8
作者
Hartung, Gunnar [1 ]
Kaidel, Bjoern [1 ]
Koch, Alexander [1 ]
Koch, Jessica [1 ]
Hartmann, Dominik [1 ]
机构
[1] KIT, Karlsruhe, Germany
来源
PROVABLE SECURITY, PROVSEC 2017 | 2017年 / 10592卷
关键词
Sequential Aggregate Signatures; Fault-Tolerance; Secure Logging; Truncation-Security; Forward-Security; VERIFIABLY ENCRYPTED SIGNATURES;
D O I
10.1007/978-3-319-68637-0_6
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Keeping correct and informative log files is crucial for system maintenance, security and forensics. Cryptographic logging schemes offer integrity checks that protect a log file even in the case where an attacker has broken into the system. A relatively recent feature of these schemes is resistance against truncations, i.e. the deletion and/or replacement of the end of the log file. This is especially relevant as system intruders are typically interested in manipulating the later log entries that point towards their attack. However, there are not many schemes that are resistant against truncating the log file. Those that are have at least one of the following disadvantages: They are memory intensive (they store at least one signature per log entry), or fragile (i.e. a single error in the log renders the signature invalid and useless in determining where the error occurred). We obtain a publicly-verifiable secure logging scheme that is simultaneously robust, space-efficient and truncation secure with provable security under simple assumptions. Our generic construction uses forward-secure signatures, in a plain and a sequential aggregate variant, where the latter is additionally fault-tolerant, as recently formalized by Hartung et al. [9]. Fault-tolerant schemes can cope with a number of manipulated log entries (bounded a priori) and offer strong robustness guarantees while still retaining space efficiency. Our implementation and the accompanying performance measurements confirm the practicality of our scheme.
引用
收藏
页码:87 / 106
页数:20
相关论文
共 25 条
[1]  
ANDERSON R, 1997, 4 ACM COMP COMM SEC
[2]  
[Anonymous], 1997, TECHNICAL REPORT
[3]  
[Anonymous], 1999, LNCS
[4]  
[Anonymous], 2001, LECT NOTES COMPUTER
[5]  
Boneh D, 2003, LECT NOTES COMPUT SC, V2656, P416
[6]  
Bowers Kevin D., 2014, Research in Attacks, Intrusions and Defenses. 17th International Symposium (RAID 2014). Proceedings: LNCS 8688, P46, DOI 10.1007/978-3-319-11379-1_3
[7]  
Boyen X., 2006, P 13 ACM C COMP COMM, P191
[8]  
Crosby S. A., 2009, USENIX SECURITY S, P317
[9]   Fault-Tolerant Aggregate Signatures [J].
Hartung, Gunnar ;
Kaidel, Bjoern ;
Koch, Alexander ;
Koch, Jessica ;
Rupp, Andy .
PUBLIC-KEY CRYPTOGRAPHY - PKC 2016, PT I, 2016, 9614 :331-356
[10]   Secure Audit Logs with Verifiable Excerpts [J].
Hartung, Gunnar .
TOPICS IN CRYPTOLOGY - CT-RSA 2016, 2016, 9610 :183-199