Filters








710 Hits in 5.0 sec

On the Use of Shamir's Secret Sharing against Side-Channel Analysis [chapter]

Jean-Sébastien Coron, Emmanuel Prouff, Thomas Roche
2013 Lecture Notes in Computer Science  
At CHES 2011 Goubin and Martinelli described a new countermeasure against side-channel analysis for AES based on Shamir's secret-sharing scheme.  ...  As a consequence of this attack, only a slight adaptation of the scheme proposed by Ben-Or et al. at STOC in 1988 can securely process multiplications on data shared with Shamir's technique.  ...  In the context of side-channel analysis, with n = 2d + 1, the algorithm is therefore still secure against a d-th order attack.  ... 
doi:10.1007/978-3-642-37288-9_6 fatcat:t4rxdfvnkbdjdd6pio5g7cyg5i

Protecting AES with Shamir's Secret Sharing Scheme [chapter]

Louis Goubin, Ange Martinelli
2011 Lecture Notes in Computer Science  
Cryptographic algorithms embedded on physical devices are particularly vulnerable to Side Channel Analysis (SCA).  ...  In this paper, we propose an original masking scheme based on Shamir's Secret Sharing scheme [23] as an alternative to Boolean masking.  ...  Introduction Side Channel Analysis is a cryptanalytic method in which an attacker analyzes the side channel leakage (e.g. the power consumption, . . . ) produced during the execution of a cryptographic  ... 
doi:10.1007/978-3-642-23951-9_6 fatcat:ydhmtcigqvfgvjw4j3bwhc6mva

High-order Masking by Using Coding Theory and Its Application to AES [chapter]

Guilhem Castagnos, Soline Renner, Gilles Zémor
2013 Lecture Notes in Computer Science  
In protecting AES against high-order side channel analysis, this approach is more efficient than methods using Shamir's secret sharing scheme and competitive with Boolean masking.  ...  To guarantee that some implementation of a cryptographic scheme is secure against side channel analysis, one needs to formally prove its leakage resilience.  ...  Introduction In the 90's, Kocher et al. published the so-called Side Channel Analysis (SCA for short) which generated a huge interest in both academic and industrial communities.  ... 
doi:10.1007/978-3-642-45239-0_12 fatcat:mk2pteeqdvft7et5k5wopovdae

Nearly optimal robust secret sharing

Mahdi Cheraghchi
2018 Designs, Codes and Cryptography  
Using algebraic geometry codes instead of Reed-Solomon codes, the share length can be decreased to a constant (only depending on δ) while the number of shares n can grow independently.  ...  We prove that a known general approach to improve Shamir's celebrated secret sharing scheme; i.e., adding an information-theoretic authentication tag to the secret, can make it robust for n parties against  ...  Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution  ... 
doi:10.1007/s10623-018-0578-y fatcat:jl6b7qtz2nbp7ppygbja3tvy2m

Privacy-preserving distributed mining of association rules using Elliptic-curve cryptosystem and Shamir's secret sharing scheme

Harendra Chahar, B N Keshavamurthy, Chirag Modi
2017 Sadhana (Bangalore)  
To address this problem, we incorporate Shamir's secret sharing scheme in the second protocol. It provides privacy by preventing colluding sites and external adversary attack.  ...  It offers privacy of individual site's information against the involving sites and an external adversary. However, the collusion of two sites may affect the privacy of individuals.  ...  combiner and miner, we use Shamir's secret sharing scheme [7] .  ... 
doi:10.1007/s12046-017-0743-4 fatcat:mtaoc33ulbhzpf6y3wzop7ehae

Secured Fingerprint based Crypto System with Reversible Watermarking Scheme

Lakshmi Saranya. R
2017 International Journal for Research in Applied Science and Engineering Technology  
As an alternative to this, the generation of finger print based key using the biometric information of sender/receiver is introduced.  ...  Implementation of this proposed work has been analyzed using reversible watermarking scheme.  ...  Three levels of secure sketch are applied to encryption domain. and Shamir's secret sharing scheme is used to bind and recover a key based on template minutia structures.Two-level construction is used  ... 
doi:10.22214/ijraset.2017.4096 fatcat:3ceulp7kvrg7bin4er3d5mla6e

Centralized Threshold Key Generation Protocol Based on Shamir Secret Sharing and HMAC Authentication

Shimaa A. Abdel Hakeem, HyungWon Kim
2022 Sensors  
This paper proposes an efficient centralized threshold shared secret protocol based on the Shamir secret sharing technique and supporting key authentication using Hashed Message Authentication Code Protocol  ...  t-of-n vehicles must recombine their secret shares and recover the original secret key.  ...  At the sender side, the G.M generates an HMAC signature using the generated master secret key S and the one-way hash function SHA256.  ... 
doi:10.3390/s22010331 pmid:35009873 pmcid:PMC8749701 fatcat:mahgifymnnejjmt5u2eereu63q

On Leakage-Resilient Secret Sharing [article]

Hemanta K. Maji, Anat Paskin-Cherniavsky, Tom Suad, Mingyuan Wang
2020 IACR Cryptology ePrint Archive  
Innovative side-channel attacks have repeatedly falsified the assumption that cryptographic implementations are opaque black-boxes.  ...  One such fundamental cryptographic primitive is the secret-sharing schemes, which underlies nearly all threshold cryptography.  ...  Power side-channel attack analysis: A review of Jacques Quisquater on the Occasion of His 65th Birthday, volume 6805 of Lec-12, 2019.  ... 
dblp:journals/iacr/MajiPSW20 fatcat:zwc3lrldbrf6bj4gqsrpbdbmey

Linear Repairing Codes and Side-Channel Attacks

Hervé Chabanne, Houssem Maghrebi, Emmanuel Prouff
2018 Transactions on Cryptographic Hardware and Embedded Systems  
To strengthen the resistance of countermeasures based on secret sharing,several works have suggested to use the scheme introduced by Shamir in 1978, which proposes to use the evaluation of a random d-degree  ...  Applying the same principles used against the classical Boolean sharing, all these works have assumed that the most efficient attack strategy was to exploit the minimum number of shares required to rebuild  ...  Introduction In the late nineties, attacks called Side-Channel Analysis (SCA) have been exhibited against cryptosystems implemented in embedded devices.  ... 
doi:10.13154/tches.v2018.i1.118-141 dblp:journals/tches/ChabanneMP18 fatcat:vdcrllwg5fbhnpk3zmfw6u7uem

Workload Characterization of a Lightweight SSL Implementation Resistant to Side-Channel Attacks [chapter]

Manuel Koschuch, Johann Großschädl, Udo Payer, Matthias Hudler, Michael Krüger
2008 Lecture Notes in Computer Science  
Furthermore, we aimed to secure the SSL handshake against side-channel attacks (in particular simple power analysis) by eliminating all data-dependent or key-dependent branches and memory accesses from  ...  Our lightweight SSL stack has only 6% of the code size and RAM requirements of OpenSSL, but outperforms it in point multiplication over prime fields when no appropriate countermeasures against side-channel  ...  The user thereof uses the information at its sole risk and liability.  ... 
doi:10.1007/978-3-540-89641-8_25 fatcat:bdzahwo3w5gdhjnpb4rz72za7i

Lightweight Authentication Model for IoT Environments Based on Enhanced Elliptic Curve Digital Signature and Shamir Secret Share

2022 International Journal of Intelligent Engineering and Systems  
In addition, the proposed model combines a modified ECDSA and Shamir's secret sharing (SSS).  ...  calculations in signature processing, and employing Shamir's Secret Sharing to further protect the random private integer.  ...  The remainder paper's organization is: section 3 presents the general construction of ECDSA, and Shamir's secret sharing algorithm, including a theoretic analysis of ECDSA's weakness.  ... 
doi:10.22266/ijies2022.1031.08 fatcat:napwczzg2bg5fi2bdf726e6dt4

Tamper-resistant cryptographic hardware

Takeshi Fujino, Takaya Kubota, Mitsuru Shiozaki
2017 IEICE Electronics Express  
The side-channel attacks (SCAs) are low cost and powerful against cryptographic hardware.  ...  The attacker exploits side-channel information such as power or electro-magnetic emission traces on the cryptographic circuits.  ...  The authors would like to express our appreciation to the co-researchers: Dr. Yohei Hori of AIST (National Institute of Advanced Industrial Science and  ... 
doi:10.1587/elex.14.20162004 fatcat:rdakxayxtjcrtkxyn2kvxcrt6i

Higher-Order Glitches Free Implementation of the AES Using Secure Multi-party Computation Protocols [chapter]

Emmanuel Prouff, Thomas Roche
2011 Lecture Notes in Computer Science  
The adaptation of the latter protocol to the context of side channel analysis results in a completely new higher-order masking scheme, particularly interesting when addressing resistance in the presence  ...  Higher-order side channel attacks (HO-SCA) is a powerful technique against cryptographic implementations and the design of appropriate countermeasures is nowadays an important topic.  ...  Introduction Higher-0rder Side-Channel Analysis (HO-SCA for short) is a class of physical cryptanalyses against cryptosystems.  ... 
doi:10.1007/978-3-642-23951-9_5 fatcat:f3mhxtymazeqpotulki45iapte

High Capacity Steganography Protected using Shamir's Threshold Scheme and Permutation Framework

2019 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
In second, Shamir's threshold scheme is designed for authentication of shared associated stego-cover images before starting the extraction process.  ...  This process provides an extremely secured construction of shared secret information.  ...  For the analysis of sickness and treatment by the doctor, loads of data have been shared over open and private channels.  ... 
doi:10.35940/ijitee.i1127.0789s19 fatcat:4j5mrjyilnf5pksgcfwuc3fybu

Secure Distributed Deduplication Systems with Improved Reliability

Jin Li, Xiaofeng Chen, Xinyi Huang, Shaohua Tang, Yang Xiang, Mohammad Mehedi Hassan, Abdulhameed Alelaiwi
2015 IEEE transactions on computers  
The security requirements of data confidentiality and tag consistency are also achieved by introducing a deterministic secret sharing scheme in distributed storage systems, instead of using convergent  ...  Security analysis demonstrates that our deduplication systems are secure in terms of the definitions specified in the proposed security model.  ...  For simplicity, we present an example based on traditional Shamir's Secret Sharing scheme. The description of (k, n)-threshold in Shamir's secret sharing scheme is as follows.  ... 
doi:10.1109/tc.2015.2401017 fatcat:f4wl4euugzfrhfylnkm26hjf2m
« Previous Showing results 1 — 15 out of 710 results