Filters








681 Hits in 5.2 sec

Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model [chapter]

Joël Alwen, Yevgeniy Dodis, Daniel Wichs
2009 Lecture Notes in Computer Science  
Our main result is an efficient three-round AKA in the Random-Oracle Model, which is resilient to key-leakage attacks that can occur prior-to and after a protocol execution.  ...  Moreover, our schemes can be flexibly extended to the Bounded-Retrieval Model, allowing us to tolerate very large absolute amount of adversarial leakage (potentially many gigabytes of information), only  ...  None of the prior or concurrent works in the public-key setting extend to the Bounded Retrieval Model. OTHER MODELS OF ADVERSARIAL KEY COMPROMISE.  ... 
doi:10.1007/978-3-642-03356-8_3 fatcat:xadyh4kh5fdxvc3v2aky4qwbby

Leakage-Resilient Certificateless Short Signature Scheme

Chen Xiaokui
2017 International Journal of Mechanical Engineering and Applications  
Besides these good performance features, we have formally proved the security of our scheme in the random oracle model under the hardness of the DDH problem.  ...  Our scheme is leakage-resilient signature scheme, and leaked information is a maximum value (upper bound).  ...  Acknowledgments The authors would like to thank the anonymous referees for their helpful comments.  ... 
doi:10.11648/j.ijmea.20170504.12 fatcat:tagilrizzvgjnjkntd7x2cviva

Black-box constructions of signature schemes in the bounded leakage setting

Jianye Huang, Qiong Huang
2018 Information Sciences  
Key words: identity-based signature, certificateless signature, black-box construction, bounded leakage model, leakage-resilient cryptography Introduction Digital signature is the analogy of message authentication  ...  This is not considered in the security model of traditional cryptographic primitives. Leakage-resilient cryptography was then proposed to prevent adversaries from doing so.  ...  In this paper we focus on the (black-box) construction of leakage-resilient signature schemes in the bounded leakage model. Related Work (Leakage-Resilient Signature).  ... 
doi:10.1016/j.ins.2017.09.055 fatcat:iangno5rhfbpxfbxy6xnbe7zue

Survey: Leakage Resilience and the Bounded Retrieval Model [chapter]

Joël Alwen, Yevgeniy Dodis, Daniel Wichs
2010 Lecture Notes in Computer Science  
This survey paper studies recent advances in the field of Leakage-Resilient Cryptography.  ...  We conclude by showing how to extend the relative leakage results to the Bounded Retrieval Model (aka "Absolute Leakage Model"), where only the secret key length is allowed to be slightly larger than ,  ...  Bounded Retrieval Model Now that we saw how to build many leakage-resilient primitives in the relative-leakage model, we would like to extend the constructions to the bounded retrieval model as well.  ... 
doi:10.1007/978-3-642-14496-7_1 fatcat:4elp4b6xx5awvb4aue7wyhzwve

Secure Mobile Agent from Leakage-Resilient Proxy Signatures

Fei Tang, Hongda Li, Qihua Niu, Bei Liang
2015 Mobile Information Systems  
Based on this consideration, in this paper, we design a leakage-resilient proxy signature scheme for the secure mobile agent systems.  ...  In such setting, an adversary could launch side-channel attacks to exploit some leakage information about the proxy key or even other secret states.  ...  XDA06010702), and the IIEs Cryptography Research Project. The authors would like to thank anonymous reviewers for their helpful comments and suggestions.  ... 
doi:10.1155/2015/901418 fatcat:wu4acgt2r5bizdjkbguinnv2mm

Leakage-Resilient Signatures [chapter]

Sebastian Faust, Eike Kiltz, Krzysztof Pietrzak, Guy N. Rothblum
2010 Lecture Notes in Computer Science  
In this work we put forward the notion of "leakage-resilient signatures," which strengthens the standard security notion by giving the adversary the additional power to learn a bounded amount of arbitrary  ...  keys) in parallel and then apply a two-source extractor to their outputs.  ...  In this paper we construct a leakage-resilient public-key primitive in the plain model, a signature-scheme.  ... 
doi:10.1007/978-3-642-11799-2_21 fatcat:pe4k2kkmzveo3bvc3dqyhlkkui

Leakage-Resilient Cryptography from Minimal Assumptions [chapter]

Carmit Hazay, Adriana López-Alt, Hoeteck Wee, Daniel Wichs
2013 Lecture Notes in Computer Science  
In particular, we construct: -Leakage-resilient public-key encryption from any standard public-key encryption.  ...  These are the first constructions of leakage-resilient symmetric-key primitives that do not rely on public-key assumptions.  ...  Bounded-Leakage Model. There are several security models of leakage-resilience in the literature, differing in their specification of what information can become available to the attacker.  ... 
doi:10.1007/978-3-642-38348-9_10 fatcat:dkjg7cfokjc2pf4ecwdtnn4mqu

Leakage-Resilient Cryptography from Minimal Assumptions

Carmit Hazay, Adriana López-Alt, Hoeteck Wee, Daniel Wichs
2015 Journal of Cryptology  
In particular, we construct: -Leakage-resilient public-key encryption from any standard public-key encryption.  ...  These are the first constructions of leakage-resilient symmetric-key primitives that do not rely on public-key assumptions.  ...  Bounded-Leakage Model. There are several security models of leakage-resilience in the literature, differing in their specification of what information can become available to the attacker.  ... 
doi:10.1007/s00145-015-9200-x fatcat:iurakihu5zhlhol2tu6pximlk4

Leakage Resilient Authenticated Key Exchange Secure in the Auxiliary Input Model [chapter]

Guomin Yang, Yi Mu, Willy Susilo, Duncan S. Wong
2013 Lecture Notes in Computer Science  
In order to resist key-leakage attacks, several leakage resilient AKE protocols have been proposed recently in the bounded leakage model.  ...  In order to resist key-leakage attacks, several leakage resilient AKE protocols have been proposed recently in the bounded leakage model.  ...  SIG-DH vs PKE-DH Several leakage resilient AKE protocols [3, 15, 25] have been proposed recently in the bounded leakage/retrieval model.  ... 
doi:10.1007/978-3-642-38033-4_15 fatcat:hqoddtn46vhkdjkcegngtcbley

Data Security and Privacy Protection for Cloud Storage: A Survey

Pan Yang, Neal N. Xiong, Jingli Ren
2020 IEEE Access  
However, this increases the possible risk, for instance, unauthorized access, data leakage, sensitive information disclosure and privacy disclosure.  ...  In this paper, we make a comprehensive review of the literatures on data security and privacy issues, data encryption technology, and applicable countermeasures in cloud storage system.  ...  Leakage-resilient can be obtained by designing secret key whose size is longer than the output of f ; 2) The bounded leakage model [1] .  ... 
doi:10.1109/access.2020.3009876 fatcat:6kcb3junlzhvvcq3qhztumpdqq

Implementation of a leakage-resilient ElGamal key encapsulation mechanism

David Galindo, Johann Großschädl, Zhe Liu, Praveen Kumar Vadnala, Srinivas Vivek
2016 Journal of Cryptographic Engineering  
The present work tries to narrow this gap for the leakage-resilient bilinear ElGamal key encapsulation mechanism (BEG-KEM) proposed by Kiltz and Pietrzak in 2010.  ...  Leakage-resilient cryptography aims to extend the rigorous guarantees achieved through the provable security paradigm to physical implementations.  ...  attacker is not able to retrieve the secret key if the per-invocation leakage is in some way "limited" or "bounded."  ... 
doi:10.1007/s13389-016-0121-x fatcat:vz3ape7ydvadvdrn2iuqkdkxly

Leakage-Resilient Symmetric Cryptography under Empirically Verifiable Assumptions [chapter]

François-Xavier Standaert, Olivier Pereira, Yu Yu
2013 Lecture Notes in Computer Science  
In this paper, we first argue that the previous "bounded leakage" requirements used in leakageresilient cryptography are hard to fulfill by hardware engineers.  ...  Leakage-resilient cryptography aims at formally proving the security of cryptographic implementations against large classes of sidechannel adversaries.  ...  Previous works in leakage-resilient cryptography (e.g. [11, 12, 13, 30, 39] ), it is argued that the bounded range assumption can be relaxed.  ... 
doi:10.1007/978-3-642-40041-4_19 fatcat:f43yibxd5vcgtf7cqm4ls6wkji

Leakage-Resilient Outsourced Revocable Certificateless Signature with a Cloud Revocation Server

Yuh–Min Tseng, Jui-Di Wu, Sen-Shan Huang, Tung-Tso Tsai
2020 Information Technology and Control  
Certificateless public-key system (CL-PKS) is a significant public-key cryptography and it solves both the key escrow and certificate management problems.  ...  To withstand such attacks, leakage-resilient cryptography is an attractive approach. However, little research concerns with leakage-resilient certificateless cryptography.  ...  For leakage-resilient cryptography, there are two leakage models, namely, bounded leakage model and continual leakage model.  ... 
doi:10.5755/j01.itc.49.4.25927 fatcat:uvedll735vcnxfyvpdzzxvlnx4

A Computational Indistinguishability Logic for the Bounded Storage Model [chapter]

Gilles Barthe, Mathilde Duclos, Yassine Lakhnech
2012 Lecture Notes in Computer Science  
Our work provides the first formalism to reason about leakage resilient cryptography.  ...  There are several models of leakage resilient cryptography, from very general models such as physically observable cryptography, to more specialized models that aim to account for a specific form of covert  ...  Thus, our work constitutes the first application of CIL to a protocol, and the first formal proof of security in a model of leakage-resilient cryptography.  ... 
doi:10.1007/978-3-642-27901-0_9 fatcat:smos7wyyhzdhxhrsc3scqj3l2y

Leakage Resilient ElGamal Encryption [chapter]

Eike Kiltz, Krzysztof Pietrzak
2010 Lecture Notes in Computer Science  
) is leakage resilient in the genericgroup model.  ...  Surprisingly, it turns out that in the context of public-key encryption some blinding techniques are more suited than others.  ...  ) [2, 41] construct public-key encryption schemes in this model, Katz and Vaikuntanathan [34] constructs digital signatures. Bounded Retrieval Model.  ... 
doi:10.1007/978-3-642-17373-8_34 fatcat:4ouifnbwfrhhtidq3gpcunthxm
« Previous Showing results 1 — 15 out of 681 results