Confidentiality-preserving distributed proofs of conjunctive queries

Adam J. Lee, Kazuhiro Minami, Nikita Borisov

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Distributed proof construction protocols have been shown to be valuable for reasoning about authorization decisions in open distributed environments such as pervasive computing spaces. Unfortunately, existing distributed proof protocols offer only limited support for protecting the confidentiality of sensitive facts, which limits their utility in many practical scenarios. In this paper, we propose a distributed proof construction protocol in which the release of a fact's truth value can be made contingent upon facts managed by other principals in the system. We formally prove that our protocol can safely prove conjunctions of facts without leaking the truth values of individual facts, even in the face of colluding adversaries and fact release policies with cyclical dependencies. This facilitates the definition of context-sensitive release policies that enable the conditional use of sensitive facts in distributed proofs.

Original languageEnglish (US)
Title of host publicationProceedings of the 4th International Symposium on ACM Symposium on Information, Computer and Communications Security, ASIACCS'09
Pages287-297
Number of pages11
DOIs
StatePublished - 2009
Event4th International Symposium on ACM Symposium on Information, Computer and Communications Security, ASIACCS'09 - Sydney, NSW, Australia
Duration: Mar 10 2009Mar 12 2009

Publication series

NameProceedings of the 4th International Symposium on ACM Symposium on Information, Computer and Communications Security, ASIACCS'09

Other

Other4th International Symposium on ACM Symposium on Information, Computer and Communications Security, ASIACCS'09
Country/TerritoryAustralia
CitySydney, NSW
Period3/10/093/12/09

Keywords

  • Consistency
  • Distributed proof
  • Pervasive computing

ASJC Scopus subject areas

  • Computational Theory and Mathematics
  • Computer Networks and Communications
  • Computer Science Applications

Fingerprint

Dive into the research topics of 'Confidentiality-preserving distributed proofs of conjunctive queries'. Together they form a unique fingerprint.

Cite this