摘要:
A method for protecting sensitive data in an entry of a log file for later audit, which includes encrypting the sensitive data in the log entry by using a random cryptographic key for each auditor authorized to access the log entry, encrypting the random cryptographic key by using an auditor's personal cryptographic key, and for each auditor not authorized to access the log entry, encrypting a fake cryptographic key having the same properties as the random cryptographic key by using an auditor's personal cryptographic key.
摘要:
A method for protecting sensitive data in an entry of a log file for later audit, which includes encrypting the sensitive data in the log entry by using a random cryptographic key for each auditor authorized to access the log entry, encrypting the random cryptographic key by using an auditor's personal cryptographic key, and for each auditor not authorized to access the log entry, encrypting a fake cryptographic key having the same properties as the random cryptographic key by using an auditor's personal cryptographic key.
摘要:
A method for managing a group signature scheme includes in a setup procedure for group initialization, generating, by a group manager, a group public key. In a join procedure for the group manager to add a new member to the group, the method includes generating by the new member, user information, and providing the generated user information to the group manager, and computing, by the group manager, membership information for the new member based on the user information received by the new member and on the group public key, and providing to the new member the computed membership information. In particular, the membership information is computed, by the group manager, as a function of the inverse of a given hash function of the user information. In a signing procedure for a group member to sign a message on behalf of the group, the method includes: using, by the group member, the membership information and the user information. The method further includes the use of digital certificates, in order for the group member to prove to the group manager the possession of said user information.
摘要:
A method for managing a group signature scheme includes in a setup procedure for group initialization, generating, by a group manager, a group public key. In a join procedure for the group manager to add a new member to the group, the method includes generating by the new member, user information, and providing the generated user information to the group manager, and computing, by the group manager, membership information for the new member based on the user information received by the new member and on the group public key, and providing to the new member the computed membership information. In particular, the membership information is computed, by the group manager, as a function of the inverse of a given hash function of the user information. In a signing procedure for a group member to sign a message on behalf of the group, the method includes: using, by the group member, the membership information and the user information. The method further includes the use of digital certificates, in order for the group member to prove to the group manager the possession of said user information.
摘要:
A method and apparatus for verifying the correctness of server access logs. The server is required to transfer the relevant log information for each client request to, an authentication device. In a preferred embodiment, the device has to be tamper-evident and responds with a Message Authentication Code (MAC) and a binary digit B. The MAC is stored on an accessible medium by the server. If B=0, the request is processed normally. If B=1 (this happens with a small probability), the server is required to issue a “redirect” response to the client, instructing it to connect to a different server, controlled by a certification agency. The agency's server logs this request and redirects it back to the original server, where it is eventually serviced. The certification agency periodically verifies each MAC and checks whether requests where B=1 correspond to an associated client log entry on its server. If this does not happen in a high number of cases, certification of the log file could be denied, based on the agency's policy. A preferred embodiment of this invention is with the HTTP protocol, for the auditing of Web site popularity.