Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Robert R. Enderlein is active.

Publication


Featured researches published by Robert R. Enderlein.


public key cryptography | 2015

Two-Server Password-Authenticated Secret Sharing UC-Secure Against Transient Corruptions ?

Jan Camenisch; Robert R. Enderlein; Gregory Neven

Protecting user data entails providing authenticated users access to their data. The most prevalent and probably also the most feasible approach to the latter is by username and password. With password breaches through server compromise now reaching billions of affected passwords, distributing the password files and user data over multiple servers is not just a good idea, it is a dearly needed solution to a topical problem. Threshold password-authenticated secret sharing (TPASS) protocols enable users to share secret data among a set of servers so that they can later recover that data using a single password. No coalition of servers up to a certain threshold can learn anything about the data or perform an offline dictionary attack on the password. Several TPASS protocols have appeared in the literature and one is even available commercially. Although designed to tolerate server corruptions, unfortunately none of these protocols provide details, let alone security proofs, about how to proceed when a compromise actually occurs. Indeed, they consider static corruptions only, which for instance does not model real-world adaptive attacks by hackers. We provide the first TPASS protocol that is provably secure against adaptive server corruptions. Moreover, our protocol contains an efficient recovery procedure allowing one to re-initialize servers to recover from corruption. We prove our protocol secure in the universal-composability model where servers can be corrupted adaptively at any time; the users’ passwords and secrets remain safe as long as both servers are not corrupted at the same time. Our protocol does not require random oracles but does assume that servers have certified public keys.


international cryptology conference | 2016

Universal Composition with Responsive Environments

Jan Camenisch; Robert R. Enderlein; Stephan Krenn; Ralf Küsters; Daniel Rausch

In universal composability frameworks, adversaries or environments and protocols/ideal functionalities often have to exchange meta-information on the network interface, such as algorithms, keys, signatures, ciphertexts, signaling information, and corruption-related messages. For these purely modeling-related messages, which do not reflect actual network communication, it would often be very reasonable and natural for adversaries/environments to provide the requested information immediately or give control back to the protocol/functionality immediately after having received some information. However, in none of the existing models for universal composability is this guaranteed. We call this the non-responsiveness problem. As we will discuss in the paper, while formally non-responsiveness does not invalidate any of the universal composability models, it has many disadvantages, such as unnecessarily complex specifications and less expressivity. Also, this problem has often been ignored in the literature, leading to ill-defined and flawed specifications. Protocol designers really should not have to care about this problem at all, but currently they have to: giving the adversary/environment the option to not respond immediately to modeling-related requests does not translate to any real attack scenario. This paper solves the non-responsiveness problem and its negative consequences completely, by avoiding this artificial modeling problem altogether. We propose the new concepts of responsive environments and adversaries. Such environments and adversaries must provide a valid response to modeling-related requests before any other protocol/functionality is activated. Hence, protocol designers do no longer have to worry about artifacts resulting from such requests not being answered promptly. Our concepts apply to all existing models for universal composability, as exemplified for the UC, GNUC, and IITM models, with full definitions and proofs simulation relations, transitivity, equivalence of various simulation notions, and composition theorems provided for the IITM model.


workshop on information security applications | 2014

Concepts and languages for privacy-preserving attribute-based authentication

Jan Camenisch; Maria Dubovitskaya; Robert R. Enderlein; Anja Lehmann; Gregory Neven; Christian Paquin; Franz-Stefan Preiss

Existing cryptographic realizations of privacy-friendly authentication mechanisms such as anonymous credentials, minimal disclosure tokens, self-blindable credentials, and group signatures vary largely in the features they offer and in how these features are realized. Some features such as revocation or de-anonymization even require the combination of several cryptographic protocols. The variety and complexity of the cryptographic protocols hinder the understanding and hence the adoption of these mechanisms in practical applications. They also make it almost impossible to change the underlying cryptographic algorithms once the application has been designed. In this paper, we aim to overcome these issues and simplify both the design and deployment of privacy-friendly authentication mechanisms. We define and unify the concepts and features of privacy-preserving attribute-based credentials (Privacy-ABCs), provide a language framework in XML schema, and present the API of a Privacy-ABC system that supports all the features we describe. Our language framework and API enable application developers to use Privacy-ABCs with all their features without having to consider the specifics of the underlying cryptographic algorithms-similar to as they do today for digital signatures, where they do not need to worry about the particulars of the RSA and DSA algorithms either.


Attribute-based Credentials for Trust | 2015

An Architecture for Privacy-ABCs

Patrik Bichsel; Jan Camenisch; Maria Dubovitskaya; Robert R. Enderlein; Stephan Krenn; Ioannis Krontiris; Anja Lehmann; Gregory Neven; Christian Paquin; Franz-Stefan Preiss; Kai Rannenberg; Ahmad Sabouri

One of the main objectives of the ABC4Trust project was to define a common, unified architecture for Privacy-ABC systems to allow comparing their respective features and combining them into common platforms. The chapter presents an overview of features and concepts of Privacy-ABCs and introduces the architecture proposed by ABC4Trust, describing the layers and components as well as the highlevel APIs. We also present the language framework of ABC4Trust through an example scenario. Furthermore, this chapter investigates integration of Privacy-ABCs with the existing Identity Management protocols and also analyses the required trust relationships in the ecosystem of Privacy-ABCs.


european symposium on research in computer security | 2013

Practical and Employable Protocols for UC-Secure Circuit Evaluation over ℤn

Jan Camenisch; Robert R. Enderlein; Victor Shoup

We present a set of new, efficient, universally composable two-party protocols for evaluating reactive arithmetic circuits modulo n, where n is a safe RSA modulus of unknown factorization. Our protocols are based on a homomorphic encryption scheme with message space ℤn, zero-knowledge proofs of existence, and a novel “mixed” trapdoor commitment scheme. Our protocols are proven secure against adaptive corruptions (assuming secure erasures) under standard assumptions in the CRS model (without random oracles). Our protocols appear to be the most efficient ones that satisfy these security requirements. In contrast to prior protocols, we provide facilities that allow for the use of our protocols as building blocks of higher-level protocols.


security and cryptography for networks | 2016

Memory Erasability Amplification

Jan Camenisch; Robert R. Enderlein; Ueli Maurer

Erasable memory is an important resource for designing practical cryptographic protocols that are secure against adaptive attacks. Many practical memory devices such as solid state drives, hard disks, or file systems are not perfectly erasable because a deletion operation leaves traces of the deleted data in the system. A number of methods for constructing a large erasable memory from a small one, e.g., using encryption, have been proposed. Despite the importance of erasable memory in cryptography, no formal model has been proposed that allows one to formally analyse such memory constructions or cryptographic protocols relying on erasable memory. The contribution of this paper is three-fold. First, we provide a formal model of erasable memory. A memory device allows a user to store, retrieve, and delete data, and it is characterised by a leakage function defining the extent to which erased data is still accessible to an adversary. Second, we investigate how the erasability of such memories can be amplified. We provide a number of constructions of memories with strong erasability guarantees from memories with weaker guarantees. One of these constructions of perfectly erasable memories from imperfectly erasable ones can be considered as the prototypical application of Canetti et al.s All-or-Nothing Transform AoNT. Motivated by this construction, we propose some new and better AoNTs that are either perfectly or computationally secure. These AoNTs are of possible independent interest. Third, we show in the constructive cryptography framework how the construction of erasable memory and its use in cryptographic protocols for example to achieve adaptive security can naturally be composed to obtain provable security of the overall protocol.


Attribute-based Credentials for Trust | 2015

Cryptographic Protocols Underlying Privacy-ABCs

Patrik Bichsel; Jan Camenisch; Maria Dubovitskaya; Robert R. Enderlein; Stephan Krenn; Anja Lehmann; Gregory Neven; Franz-Stefan Preiss

In this chapter we present the Cryptographic Engine which provides the cryptographic functionality used in the ABC Engine, such as issuance or presentation of credentials. We first describe the architecture of the Cryptographic Engine, explain the building blocks it uses, and explain how they are bound together. We then describe the cryptographic primitives that the library uses to instantiate those building blocks.


Archive | 2014

D2.2 - Architecture for Attribute-based Credential Technologies - Final Version

Patrik Bichsel; Jan Camenisch; Maria Dubovitskaya; Robert R. Enderlein; Stephan Krenn; Ioannis Krontiris; Anja Lehmann; Gregory Neven; Janus Dam Nielsen; Christian Paquin; Franz-Stefan Preiss; Kai Rannenberg; Ahmad Sabouri; Michael Bladt Stausholm; Jonas Lindstrøm Jensen


Archive | 2017

Password-Based Generation and Management of Secret Cryptographic Keys

Jan Camenisch; Robert R. Enderlein; Stephan Krenn; Anja Lehmann; Gregory Neven


Archive | 2017

PRIVACY-PRESERVING ATTRIBUTE-BASED CREDENTIALS

Jan Camenisch; Robert R. Enderlein; Anja Lehmann; Gregory Neven

Collaboration


Dive into the Robert R. Enderlein's collaboration.

Researchain Logo
Decentralizing Knowledge