Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Brian A. Lamacchia is active.

Publication


Featured researches published by Brian A. Lamacchia.


provable security | 2007

Stronger security of authenticated key exchange

Brian A. Lamacchia; Kristin E. Lauter; Anton Mityagin

Recent work by Krawczyk [12] and Menezes [16] has highlighted the importance of understanding well the guarantees and limitations of formal security models when using them to prove the security of protocols. In this paper we focus on security models for authenticated key exchange (AKE) protocols. We observe that there are several classes of attacks on AKE protocols that lie outside the scope of the Canetti-Krawczyk model. Some of these additional attacks have already been considered by Krawczyk [12]. In an attempt to bring these attacks within the scope of the security model we extend the Canetti-Krawczyk model for AKE security by providing significantly greater powers to the adversary. Our contribution is a more compact, integrated, and comprehensive formulation of the security model. We then introduce a new AKE protocol called NAXOS and prove that it is secure against these stronger adversaries.


international world wide web conferences | 1997

REFEREE: trust management for Web applications

Yang-Hua Chu; Joan Feigenbaum; Brian A. Lamacchia; Paul Resnick; M. Strauss

Abstract Digital signatures provide a mechanism for guaranteeing integrity and authenticity of Web content but not more general notions of security or trust. Web-aware applications must permit users to state clearly their own security policies and, of course, must provide the cryptographic tools for manipulating digital signatures. This paper describes the REFEREE trust management system for Web applications; REFEREE provides both a general policy-evaluation mechanism for Web clients and servers and a language for specifying trust policies. REFEREE places all trust decisions under explicit policy control; in the REFEREE model, every action, including evaluation of compliance with policy, happens under the control of some policy. That is, REFEREE is a system for writing policies about policies, as well as policies about cryptographic keys, PICS label bureaus, certification authorities, trust delegation, or anything else. In this paper, we flesh out the need for trust management in Web applications, explain the design philosophy of the REFEREE trust management system, and describe a prototype implementation of REFEREE.


compiler construction | 1992

Improved low-density subset sum algorithms

Matthijs J. Coster; Antoine Joux; Brian A. Lamacchia; Andrew M. Odlyzko; Claus-Peter Schnorr; Jacques Stern

The general subset sum problem is NP-complete. However, there are two algorithms, one due to Brickell and the other to Lagarias and Odlyzko, which in polynomial time solve almost all subset sum problems of sufficiently low density. Both methods rely on basis reduction algorithms to find short non-zero vectors in special lattices. The Lagarias-Odlyzko algorithm would solve almost all subset sum problems of density<0.6463 ... in polynomial time if it could invoke a polynomial-time algorithm for finding the shortest non-zero vector in a lattice. This paper presents two modifications of that algorithm, either one of which would solve almost all problems of density<0.9408 ... if it could find shortest non-zero vectors in lattices. These modifications also yield dramatic improvements in practice when they are combined with known lattice basis reduction algorithms.


international cryptology conference | 1990

Solving Large Sparse Linear Systems over Finite Fields

Brian A. Lamacchia; Andrew M. Odlyzko

Many of the fast methods for factoring integers and computing discrete logarithms require the solution of large sparse linear systems of equations over finite fields. This paper presents the results of implementations of several linear algebra algorithms. It shows that very large sparse systems can be solved efficiently by using combinations of structured Gaussian elimination and the conjugate gradient, Lanczos, and Wiedemann methods.


conference on theory and application of cryptography | 1991

Computation of discrete logarithms in prime fields

Brian A. Lamacchia; Andrew M. Odlyzko

The presumed difficulty of computing discrete logarithms in finite fields is the basis of several popular public key cryptosystems. The secure identification option of the Sun Network File System, for example, uses discrete logarithms in a field GF(p) with p a prime of 192 bits. This paper describes an implementation of a discrete logarithm algorithm which shows that primes of under 200 bits, such as that in the Sun system, are very insecure. Some enhancements to this system are suggested.


theory and application of cryptographic techniques | 1991

An improved low-density subset sum algorithm

M. J. Coster; Brian A. Lamacchia; Andrew M. Odlyzko; Claus-Peter Schnorr

The general subset sum problem is NP-complete. However, there are two algorithms, one due to Brickell and the other to Lagarias and Odlyzko, which in polynomial time solve almost all subset sum problems of sufficiently low density. Both methods rely on basis reduction algorithms to find short non-zero vectors in special lattices. The Lagarias-Odlyzko algorithm would solve almost all subset sum problems of density < 0.6463... in polynomial time if it could invoke a polynomial-time algorithm for finding the shortest non-zero vector in a lattice. This note shows that a simple modification of that algorithm would solve almost all problems of density < 0.9408... if it could find shortest non-zero vectors in lattices. This modification also yields dramatic improvements in practice when it is combined with known lattice basis reduction algorithms.


digital rights management | 2002

Key Challenges in DRM: An Industry Perspective

Brian A. Lamacchia

The desires for robust digital rights management (DRM) systems are not new to the commercial world. Indeed, industrial research, development and deployment of systems with DRM aspects (most notably crude copy-control schemes) have a long history. Yet to date the industry has not seen much commercial success from shipping these systems on top of platforms that support general-purpose computing. There are many factors contributing to this lack of acceptance of current DRM systems, but I see three specific areas of work that are key adoption blockers today and ripe for further academic and commercial research. The lack of a general-purpose rights expression/authorization language, robust trust management engines and attestable trusted computing bases (TCBs) all hamper industrial development and deployment of DRM systems for digital content. In this paper I briefly describe each of these challenges, provide examples of how the industry is approaching each problem, and discuss how the solutions to each one of them are dependent on the others.


digital rights management | 2003

Encouraging recognition of fair uses in DRM systems

Barbara L. Fox; Brian A. Lamacchia

Create subsets of fair uses---safe harbors---that are allowed without the explicit permission of copyright holders.


international world wide web conferences | 1997

The Internet fish construction kit

Brian A. Lamacchia

Abstract We describe in this paper the Internet Fish Construction Kit, a tool for building persistent, personal, dynamic information gatherers (“Internet Fish”) [3] for the World-Wide Web. Internet Fish ( IFish ) differ from current resource discovery tools in that they are introspective, incorporating deep structural knowledge of the organization and services of the Web, and are also capable of on-the-fly reconfiguration, modification and expansion. Introspection lets IFish examine their own information-gathering processes and identify successful resource discovery techniques while they operate; IFish automatically remember not only what information has been uncovered but also how that information was derived. Dynamic reconfiguration and expansion permits IFish to be modified to take advantage of new information sources or analysis techniques, or to model changes in the users interests, as they wander the Web. Together, these properties define a much more powerful class of resource discovery tools than previously available. The IFish Construction Kit makes it possible to rapidly and easily build IFish -class tools. The Kit includes a general architecture for individual IFish , a language for specifying IFish information objects, and an operating environment for running individual IFish .


Archive | 2004

A Conceptual Authorization Model for Web Services

Paul J. Leach; Blair B. Dillaway; Praerit Garg; Chris Kaler; Brian A. Lamacchia; Butler W. Lampson; John L. Manferdelli; Rick Rashid; John P. Shewchuk; Daniel R. Simon; Richard B. Ward

This paper describes a conceptual authorization model for Web Services. It is an adaptation of those of Taos [Lamp92] and SDSI [Lamp96] with terms changed to correspond more closely to those introduced with the WS-Security model [WS02]. In contrast to the more formal and mathematical presentation used for Taos and SDSI, this presentation is conceptual and informal, which hopefully may provide more intuition for some readers; it also might provide an outline for the class hierarchy of an object-oriented implementation. In addition, this model abstracts away from issues of distribution and network security such as authentication [Need78] and encryption (for example, by assuming that messages include the unforgeable identity of the sender and are private and tamperproof) so as to focus on authorization, but it does deal with the extensibility and composability of security services, and partial trust. It also

Collaboration


Dive into the Brian A. Lamacchia's collaboration.

Researchain Logo
Decentralizing Knowledge