A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
[chapter]
2009
Lecture Notes in Computer Science
Our main result is an efficient three-round AKA in the Random-Oracle Model, which is resilient to key-leakage attacks that can occur prior-to and after a protocol execution. ...
Moreover, our schemes can be flexibly extended to the Bounded-Retrieval Model, allowing us to tolerate very large absolute amount of adversarial leakage (potentially many gigabytes of information), only ...
None of the prior or concurrent works in the public-key setting extend to the Bounded Retrieval Model. OTHER MODELS OF ADVERSARIAL KEY COMPROMISE. ...
doi:10.1007/978-3-642-03356-8_3
fatcat:xadyh4kh5fdxvc3v2aky4qwbby
Leakage-Resilient Certificateless Short Signature Scheme
2017
International Journal of Mechanical Engineering and Applications
Besides these good performance features, we have formally proved the security of our scheme in the random oracle model under the hardness of the DDH problem. ...
Our scheme is leakage-resilient signature scheme, and leaked information is a maximum value (upper bound). ...
Acknowledgments The authors would like to thank the anonymous referees for their helpful comments. ...
doi:10.11648/j.ijmea.20170504.12
fatcat:tagilrizzvgjnjkntd7x2cviva
Black-box constructions of signature schemes in the bounded leakage setting
2018
Information Sciences
Key words: identity-based signature, certificateless signature, black-box construction, bounded leakage model, leakage-resilient cryptography Introduction Digital signature is the analogy of message authentication ...
This is not considered in the security model of traditional cryptographic primitives. Leakage-resilient cryptography was then proposed to prevent adversaries from doing so. ...
In this paper we focus on the (black-box) construction of leakage-resilient signature schemes in the bounded leakage model.
Related Work (Leakage-Resilient Signature). ...
doi:10.1016/j.ins.2017.09.055
fatcat:iangno5rhfbpxfbxy6xnbe7zue
Survey: Leakage Resilience and the Bounded Retrieval Model
[chapter]
2010
Lecture Notes in Computer Science
This survey paper studies recent advances in the field of Leakage-Resilient Cryptography. ...
We conclude by showing how to extend the relative leakage results to the Bounded Retrieval Model (aka "Absolute Leakage Model"), where only the secret key length is allowed to be slightly larger than , ...
Bounded Retrieval Model Now that we saw how to build many leakage-resilient primitives in the relative-leakage model, we would like to extend the constructions to the bounded retrieval model as well. ...
doi:10.1007/978-3-642-14496-7_1
fatcat:4elp4b6xx5awvb4aue7wyhzwve
Secure Mobile Agent from Leakage-Resilient Proxy Signatures
2015
Mobile Information Systems
Based on this consideration, in this paper, we design a leakage-resilient proxy signature scheme for the secure mobile agent systems. ...
In such setting, an adversary could launch side-channel attacks to exploit some leakage information about the proxy key or even other secret states. ...
XDA06010702), and the IIEs Cryptography Research Project. The authors would like to thank anonymous reviewers for their helpful comments and suggestions. ...
doi:10.1155/2015/901418
fatcat:wu4acgt2r5bizdjkbguinnv2mm
Leakage-Resilient Signatures
[chapter]
2010
Lecture Notes in Computer Science
In this work we put forward the notion of "leakage-resilient signatures," which strengthens the standard security notion by giving the adversary the additional power to learn a bounded amount of arbitrary ...
keys) in parallel and then apply a two-source extractor to their outputs. ...
In this paper we construct a leakage-resilient public-key primitive in the plain model, a signature-scheme. ...
doi:10.1007/978-3-642-11799-2_21
fatcat:pe4k2kkmzveo3bvc3dqyhlkkui
Leakage-Resilient Cryptography from Minimal Assumptions
[chapter]
2013
Lecture Notes in Computer Science
In particular, we construct: -Leakage-resilient public-key encryption from any standard public-key encryption. ...
These are the first constructions of leakage-resilient symmetric-key primitives that do not rely on public-key assumptions. ...
Bounded-Leakage Model. There are several security models of leakage-resilience in the literature, differing in their specification of what information can become available to the attacker. ...
doi:10.1007/978-3-642-38348-9_10
fatcat:dkjg7cfokjc2pf4ecwdtnn4mqu
Leakage-Resilient Cryptography from Minimal Assumptions
2015
Journal of Cryptology
In particular, we construct: -Leakage-resilient public-key encryption from any standard public-key encryption. ...
These are the first constructions of leakage-resilient symmetric-key primitives that do not rely on public-key assumptions. ...
Bounded-Leakage Model. There are several security models of leakage-resilience in the literature, differing in their specification of what information can become available to the attacker. ...
doi:10.1007/s00145-015-9200-x
fatcat:iurakihu5zhlhol2tu6pximlk4
Leakage Resilient Authenticated Key Exchange Secure in the Auxiliary Input Model
[chapter]
2013
Lecture Notes in Computer Science
In order to resist key-leakage attacks, several leakage resilient AKE protocols have been proposed recently in the bounded leakage model. ...
In order to resist key-leakage attacks, several leakage resilient AKE protocols have been proposed recently in the bounded leakage model. ...
SIG-DH vs PKE-DH Several leakage resilient AKE protocols [3, 15, 25] have been proposed recently in the bounded leakage/retrieval model. ...
doi:10.1007/978-3-642-38033-4_15
fatcat:hqoddtn46vhkdjkcegngtcbley
Data Security and Privacy Protection for Cloud Storage: A Survey
2020
IEEE Access
However, this increases the possible risk, for instance, unauthorized access, data leakage, sensitive information disclosure and privacy disclosure. ...
In this paper, we make a comprehensive review of the literatures on data security and privacy issues, data encryption technology, and applicable countermeasures in cloud storage system. ...
Leakage-resilient can be obtained by designing secret key whose size is longer than the output of f ; 2) The bounded leakage model [1] . ...
doi:10.1109/access.2020.3009876
fatcat:6kcb3junlzhvvcq3qhztumpdqq
Implementation of a leakage-resilient ElGamal key encapsulation mechanism
2016
Journal of Cryptographic Engineering
The present work tries to narrow this gap for the leakage-resilient bilinear ElGamal key encapsulation mechanism (BEG-KEM) proposed by Kiltz and Pietrzak in 2010. ...
Leakage-resilient cryptography aims to extend the rigorous guarantees achieved through the provable security paradigm to physical implementations. ...
attacker is not able to retrieve the secret key if the per-invocation leakage is in some way "limited" or "bounded." ...
doi:10.1007/s13389-016-0121-x
fatcat:vz3ape7ydvadvdrn2iuqkdkxly
Leakage-Resilient Symmetric Cryptography under Empirically Verifiable Assumptions
[chapter]
2013
Lecture Notes in Computer Science
In this paper, we first argue that the previous "bounded leakage" requirements used in leakageresilient cryptography are hard to fulfill by hardware engineers. ...
Leakage-resilient cryptography aims at formally proving the security of cryptographic implementations against large classes of sidechannel adversaries. ...
Previous works in leakage-resilient cryptography (e.g. [11, 12, 13, 30, 39] ), it is argued that the bounded range assumption can be relaxed. ...
doi:10.1007/978-3-642-40041-4_19
fatcat:f43yibxd5vcgtf7cqm4ls6wkji
Leakage-Resilient Outsourced Revocable Certificateless Signature with a Cloud Revocation Server
2020
Information Technology and Control
Certificateless public-key system (CL-PKS) is a significant public-key cryptography and it solves both the key escrow and certificate management problems. ...
To withstand such attacks, leakage-resilient cryptography is an attractive approach. However, little research concerns with leakage-resilient certificateless cryptography. ...
For leakage-resilient cryptography, there are two leakage models, namely, bounded leakage model and continual leakage model. ...
doi:10.5755/j01.itc.49.4.25927
fatcat:uvedll735vcnxfyvpdzzxvlnx4
A Computational Indistinguishability Logic for the Bounded Storage Model
[chapter]
2012
Lecture Notes in Computer Science
Our work provides the first formalism to reason about leakage resilient cryptography. ...
There are several models of leakage resilient cryptography, from very general models such as physically observable cryptography, to more specialized models that aim to account for a specific form of covert ...
Thus, our work constitutes the first application of CIL to a protocol, and the first formal proof of security in a model of leakage-resilient cryptography. ...
doi:10.1007/978-3-642-27901-0_9
fatcat:smos7wyyhzdhxhrsc3scqj3l2y
Leakage Resilient ElGamal Encryption
[chapter]
2010
Lecture Notes in Computer Science
) is leakage resilient in the genericgroup model. ...
Surprisingly, it turns out that in the context of public-key encryption some blinding techniques are more suited than others. ...
) [2, 41] construct public-key encryption schemes in this model, Katz and Vaikuntanathan [34] constructs digital signatures. Bounded Retrieval Model. ...
doi:10.1007/978-3-642-17373-8_34
fatcat:4ouifnbwfrhhtidq3gpcunthxm
« Previous
Showing results 1 — 15 out of 681 results