Utilize este identificador para referenciar este registo: https://hdl.handle.net/1822/36149

Registo completo
Campo DCValorIdioma
dc.contributor.authorAlmeida, José Bacelarpor
dc.contributor.authorBarbosa, Manuelpor
dc.contributor.authorBangerter, Endrepor
dc.contributor.authorBarthe, Gillespor
dc.contributor.authorKrenn, Stephanpor
dc.contributor.authorBéguelin, Santiago Zanellapor
dc.date.accessioned2015-07-15T13:47:11Z-
dc.date.available2015-07-15T13:47:11Z-
dc.date.issued2012-
dc.identifier.isbn978-1-4503-1651-4-
dc.identifier.issn1543-7221por
dc.identifier.urihttps://hdl.handle.net/1822/36149-
dc.description.abstractDevelopers building cryptography into security-sensitive applications face a daunting task. Not only must they understand the security guarantees delivered by the constructions they choose, they must also implement and combine them correctly and efficiently. Cryptographic compilers free developers from having to implement cryptography on their own by turning high-level specifications of security goals into efficient implementations. Yet, trusting such tools is risky as they rely on complex mathematical machinery and claim security properties that are subtle and difficult to verify. In this paper, we present ZKCrypt, an optimizing cryptographic compiler that achieves an unprecedented level of assurance without sacrificing practicality for a comprehensive class of cryptographic protocols, known as Zero-Knowledge Proofs of Knowledge. The pipeline of ZKCrypt tightly integrates purpose-built verified compilers and verifying compilers producing formal proofs in the CertiCrypt framework. By combining the guarantees delivered by each stage in the pipeline, ZKCrypt provides assurance that the implementation it outputs securely realizes the high-level proof goal given as input. We report on the main characteristics of ZKCrypt, highlight new definitions and concepts at its foundations, and illustrate its applicability through a representative example of an anonymous credential system.por
dc.description.sponsorship(undefined)por
dc.language.isoengpor
dc.publisherACMpor
dc.rightsopenAccesspor
dc.subjectZero-knowledgepor
dc.subjectVerifying compilationpor
dc.subjectCryptographic compilerpor
dc.titleFull proof cryptography: verifiable compilation of efficient zero-knowledge protocolspor
dc.typeconferencePaperpor
dc.peerreviewedyespor
dc.relation.publisherversionhttp://dl.acm.org/citation.cfm?id=2382249por
sdum.publicationstatuspublishedpor
oaire.citationStartPage488por
oaire.citationEndPage500por
oaire.citationTitle19th ACM Conference on Computer and Communications Securitypor
dc.identifier.doi10.1145/2382196.2382249por
sdum.journalProceedings of the ACM Conference on Computer and Communications Securitypor
sdum.conferencePublication19th ACM Conference on Computer and Communications Securitypor
Aparece nas coleções:HASLab - Artigos em atas de conferências internacionais (texto completo)

Ficheiros deste registo:
Ficheiro TamanhoFormato 
1225.pdf944,97 kBAdobe PDFVer/Abrir

Partilhe no FacebookPartilhe no TwitterPartilhe no DeliciousPartilhe no LinkedInPartilhe no DiggAdicionar ao Google BookmarksPartilhe no MySpacePartilhe no Orkut
Exporte no formato BibTex mendeley Exporte no formato Endnote Adicione ao seu ORCID