Timed-Ephemerizer: Make Assured Data Appear and Disappear

Qiang Tang

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    6 Citations (Scopus)
    12 Downloads (Pure)

    Abstract

    The concept of Ephemerizer, proposed by Perlman, is a mechanism for assured data deletion. Ephemerizer provides a useful service that expired data deleted from the persistent storage devices will be unrecoverable, even if later on some of the private keys in the system are compromised. However, no security model has ever been proposed for this primitive and existing protocols have not been studied formally. In practice, a potential shortcoming of existing Ephemerizer protocols is that they are supposed to provide only assured deletion but not assured initial disclosure. In other words, there is no guarantee on when the data will be initially disclosed. In this paper, we formalize the notion of Timed-Ephemerizer which can be regarded as augmented Ephemerizer and can provide both assured initial disclosure and deletion for sensitive data. We propose a new Timed-Ephemerizer protocol and prove its security in the proposed security model.
    Original languageUndefined
    Title of host publicationSixth European Workshop on Public Key Services, Applications and Infrastructures
    Place of PublicationLondon
    PublisherSpringer
    Pages195-208
    Number of pages21
    ISBN (Print)978-3-642-16440-8
    DOIs
    Publication statusPublished - 2009
    EventSixth European Workshop on Public Key Services, Applications and Infrastructures - Pisa, Italy
    Duration: 10 Sept 200911 Sept 2009

    Publication series

    NameLecture Notes in Computer Science
    PublisherSpringer Verlag
    Volume6391
    ISSN (Print)0302-9743
    ISSN (Electronic)1611-3349

    Workshop

    WorkshopSixth European Workshop on Public Key Services, Applications and Infrastructures
    Period10/09/0911/09/09
    Other10-11 September, 2009

    Keywords

    • METIS-263951
    • EWI-15802
    • SCS-Cybersecurity
    • IR-67831

    Cite this