Even More Practical Secure Logging: Tree-Based Seekable Sequential Key Generators

  • Giorgia Azzurra Marson
  • Bertram Poettering
Conference paper

DOI: 10.1007/978-3-319-11212-1_3

Part of the Lecture Notes in Computer Science book series (LNCS, volume 8713)
Cite this paper as:
Marson G.A., Poettering B. (2014) Even More Practical Secure Logging: Tree-Based Seekable Sequential Key Generators. In: Kutyłowski M., Vaidya J. (eds) Computer Security - ESORICS 2014. ESORICS 2014. Lecture Notes in Computer Science, vol 8713. Springer, Cham

Abstract

Sequential key generators produce a forward-secure sequence of symmetric cryptographic keys and are traditionally based on hash chains. An inherent disadvantage of such constructions is that they do not offer a fast-forward capability, i.e., lack a way to efficiently skip a large number of keys—a functionality often required in practice. This limitation was overcome only recently, with the introduction of seekable sequential key generators (SSKGs). The only currently known construction is based on the iterated evaluation of a shortcut one-way permutation, a factoring-based —and hence in practice not too efficient— building block. In this paper we revisit the challenge of marrying forward-secure key generation with seekability and show that symmetric primitives like PRGs, block ciphers, and hash functions suffice for obtaining secure SSKGs. Our scheme is not only considerably more efficient than the prior number-theoretic construction, but also extends the seeking functionality in a way that we believe is important in practice. Our construction is provably (forward-)secure in the standard model.

Keywords

secured logging forward security seekable PRGs 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  • Giorgia Azzurra Marson
    • 1
  • Bertram Poettering
    • 2
  1. 1.CASED & TU DarmstadtGermany
  2. 2.Information Security Group at Royal HollowayUniversity of LondonUK

Personalised recommendations