Главная
Study mode:
on
1
Intro
2
Motivating Example: Medical Record System
3
Ghostor: Cryptographic Data Sharing System
4
E2EE Data Sharing vs. Ghostor's Anonymity
5
Verifiable Linearizability
6
Comparison to Existing Work
7
Bootstrapping Decentralized Trust
8
Strawman: Use a Blockchain
9
Ghostor's System Architecture
10
Verifiable History (Strawman)
11
Shared Capabilities
12
Additional Challenge: Concurrent Operations
13
This Technique Does Not Work for Writes
14
Ghostor Stack
15
Implementation
16
Server-Side Latency to PUT a 1 MiB Object
17
Total Latency
18
Conclusion
Description:
Explore a conference talk on Ghostor, a secure data-sharing system built on decentralized trust. Learn about a novel approach to protecting user privacy and data integrity from compromised servers. Discover how Ghostor hides user identities and allows detection of server-side integrity violations without relying on centralized trust. Understand the system's innovative design, which avoids per-user authentication and user-specific mailboxes. Delve into the concept of verifiable anonymous history and how Ghostor utilizes blockchain technology minimally. Examine the system's architecture, implementation challenges, and performance metrics. Gain insights into the trade-offs between security, privacy, and system overhead in data-sharing applications.

Ghostor - Toward a Secure Data Sharing System from Decentralized Trust

USENIX
Add to list
0:00 / 0:00