Главная
Study mode:
on
1
Intro
2
Representative authorization example
3
Traditional approach
4
Graph Based Authorization
5
This forms a single global graph
6
The encryption & secret must capture the permissions
7
Reverse Discoverable Encryption Summary
8
High Level Overview
9
Constructed using three Merkle trees
10
Auditor replays operation log to construct replica
11
Unequivocable Log Derived Map Summary
12
Conclusion
13
Thank you & Questions
Description:
Explore a groundbreaking decentralized authorization framework in this 20-minute conference talk from USENIX Security '19. Delve into WAVE (Wide Area Verified Exchange), a system that eliminates central trust services, allowing users to autonomously delegate permissions without compromising security. Learn how WAVE's innovative approach uses an expressive authorization model, cryptographic enforcement, and a novel encryption protocol to protect and discover permissions while storing them in an untrusted scalable solution. Discover the framework's real-world application in controlling 800 IoT devices over two years, and gain insights into its competitive performance compared to traditional centralized systems. Follow the presentation's journey from introduction to conclusion, covering topics such as graph-based authorization, reverse discoverable encryption, and unequivocable log-derived maps.

WAVE - A Decentralized Authorization Framework with Transitive Delegation

USENIX
Add to list