Existing software-based data erasure programs can be summarized as following the same one-bit-return protocol: the deletion program performs data erasure and returns either success or failure. However, such a one-bit-return protocol turns the data deletion system into a black box-the user has to trust the outcome but cannot easily verify it. This is especially problematic when the deletion program is encapsulated within a Trusted Platform Module (TPM), and the user has no access to the code inside. In this paper, we present a cryptographic solution that aims to make the data deletion process more transparent and verifiable. In contrast to the conventional black/white assumptions about TPM (i.e., either completely trust or distrust), we intr...
The privacy of users has rapidly become one of the most pervasive and stringent requirements in dist...
Abstract—Malicious software typically resides stealthily on a user’s computer and interacts with the...
Tamper-proof devices are pretty powerful. They typically make security applications simpler (provide...
The problem of secure data erasure has been extensively studied in the past with a rich body of lite...
Information erasure is a formal security requirement that stipulates when sensitive data must be rem...
Trusted computing introduces the Trusted Platform Module (TPM) as a root of trust on an otherwise un...
Abstract. In our previous work, we have proposed a framework which allows tools that can check stand...
The Trusted Platform Module (TPM) is an international standard for a security chip that can be used ...
Ensuring confidentiality of sensitive data is of paramount importance, since data leakage may not on...
The Secret Prover is a Java application which allows a user (A) to prove to another user (B), that A...
One of today’s main challenge related to cloud storage is to maintain the functionalities and the e...
Data Provenance describes what has happened to a users data within a ma- chine as a form of digital ...
Abstract—Malicious software typically resides stealthily on a user’s computer and interacts with the...
We propose a new, unifying framework that yields an array of cryptographic primitives with certified...
The Trusted Platform Module (TPM) is an international standard for a security chip that can be used ...
The privacy of users has rapidly become one of the most pervasive and stringent requirements in dist...
Abstract—Malicious software typically resides stealthily on a user’s computer and interacts with the...
Tamper-proof devices are pretty powerful. They typically make security applications simpler (provide...
The problem of secure data erasure has been extensively studied in the past with a rich body of lite...
Information erasure is a formal security requirement that stipulates when sensitive data must be rem...
Trusted computing introduces the Trusted Platform Module (TPM) as a root of trust on an otherwise un...
Abstract. In our previous work, we have proposed a framework which allows tools that can check stand...
The Trusted Platform Module (TPM) is an international standard for a security chip that can be used ...
Ensuring confidentiality of sensitive data is of paramount importance, since data leakage may not on...
The Secret Prover is a Java application which allows a user (A) to prove to another user (B), that A...
One of today’s main challenge related to cloud storage is to maintain the functionalities and the e...
Data Provenance describes what has happened to a users data within a ma- chine as a form of digital ...
Abstract—Malicious software typically resides stealthily on a user’s computer and interacts with the...
We propose a new, unifying framework that yields an array of cryptographic primitives with certified...
The Trusted Platform Module (TPM) is an international standard for a security chip that can be used ...
The privacy of users has rapidly become one of the most pervasive and stringent requirements in dist...
Abstract—Malicious software typically resides stealthily on a user’s computer and interacts with the...
Tamper-proof devices are pretty powerful. They typically make security applications simpler (provide...