Powered by OpenAIRE graph
Found an issue? Give us feedback
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/ ZENODOarrow_drop_down
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
ZENODO
Other literature type . 2026
License: CC BY
Data sources: ZENODO
ZENODO
Other literature type . 2026
License: CC BY
Data sources: Datacite
ZENODO
Other literature type . 2026
License: CC BY
Data sources: Datacite
ZENODO
Other literature type . 2026
License: CC BY
Data sources: Datacite
versions View all 3 versions
addClaim

Cryptographically Self-Verifying Systems: Backend-Blind Veriability in Adversarial Environments

Authors: Juan Rodríguez Monti;

Cryptographically Self-Verifying Systems: Backend-Blind Veriability in Adversarial Environments

Abstract

High-stakes digital processes—such as coordinated vulnerability disclosure, zero-day handling, regulatory filings, and compliance attestations—require confidentiality until a defined disclosure event, together with integrity, authenticity, and non-repudiation. Most existing systems rely on trusted infrastructure, privileged operators, or internal logs, assumptions that are increasingly fragile in the presence of breaches and insider threats. We introduce Cryptographically Self-Verifying Systems (CSVS), a system-level design pattern that makes operational infrastructure untrusted by design. CSVS enables any third party to verify correctness post hoc using only publicly observable artifacts, even when the infrastructure is fully malicious, while relying only on a semi-honest disclosure authority. A key property is Backend Blindness: the infrastructure cannot access or distinguish protected payloads prior to authorized disclosure, enforced purely by the semantic security of hybrid encryption with mandatory length-hiding padding. We formalize CSVS under a fully adversarial infrastructure model and prove confidentiality, integrity, authenticity, non-repudiation, and Backend Blindness from standard cryptographic assumptions. We further provide low-overhead, verifiable relative temporal ordering via optimized hash chaining, combined with independent publication mechanisms to prevent suppression. We evaluate security, performance, and limitations, and demonstrate applicability through case studies in vulnerability disclosure, regulatory compliance, and research integrity. This version substantially extends the initial preprint with a formal adversarial model, protocol specification, security proofs, and evaluation.

Keywords

transparency, Computer security, zero-day disclosure, Cryptography, verifiability, compliance, post-hoc verification

  • BIP!
    Impact byBIP!
    selected citations
    These citations are derived from selected sources.
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    0
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Average
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Average
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Average
Powered by OpenAIRE graph
Found an issue? Give us feedback
selected citations
These citations are derived from selected sources.
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
0
Average
Average
Average