Filters








864 Hits in 3.4 sec

Public-Key Cryptosystems Resilient to Key Leakage

Moni Naor, Gil Segev
2012 SIAM journal on computing (Print)  
In the setting of public-key encryption, Akavia et al. showed that Regev's lattice-based scheme (STOC '05) is resilient to any leakage of L/polylog(L) bits, where L is the length of the secret key.  ...  In this paper we revisit the above-mentioned framework and our main results are as follows: • We present a generic construction of a public-key encryption scheme that is resilient to key leakage from any  ...  [10] is also resilient to key leakage attacks.  ... 
doi:10.1137/100813464 fatcat:esy7hizicnhfnlrjhfns3cvc3i

Public-Key Cryptosystems Resilient to Key Leakage [chapter]

Moni Naor, Gil Segev
2009 Lecture Notes in Computer Science  
In the setting of public-key encryption, Akavia et al. showed that Regev's lattice-based scheme (STOC '05) is resilient to any leakage of L/polylog(L) bits, where L is the length of the secret key.  ...  In this paper we revisit the above-mentioned framework and our main results are as follows: • We present a generic construction of a public-key encryption scheme that is resilient to key leakage from any  ...  [10] is also resilient to key leakage attacks.  ... 
doi:10.1007/978-3-642-03356-8_2 fatcat:l2heok44bnbydfgovvnjj2hux4

Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions [chapter]

Eiichiro Fujisaki, Keita Xagawa
2016 Lecture Notes in Computer Science  
We present the first chosen-ciphertext secure public-key encryption schemes resilient to continuous tampering of arbitrary (efficiently computable) functions.  ...  As in the previous works resilient to this type of tampering attacks, our schemes also tolerate bounded or continuous memory leakage attacks at the same time.  ...  Introduction We study the tampering attack security, or equivalently the related-key attack security, of public-key cryptosystems.  ... 
doi:10.1007/978-3-662-53887-6_33 fatcat:bxvtpj5pcvfpjd4eigly6jkt54

Modelling after-the-fact leakage for key exchange

Janaka Alawatugoda, Douglas Stebila, Colin Boyd
2014 Proceedings of the 9th ACM symposium on Information, computer and communications security - ASIA CCS '14  
public-key cryptosystem.  ...  We identify a special property for public-key cryptosystems: pair generation indistinguishability, and show how to obtain the leakage-resilient NAXOS trick from a pair generation indistinguishable leakage-resilient  ...  Thus, the leakage-resilient public-key cryptosystem of Naor et al. is 0-PG-IND. The generic CPLA2-secure public-key cryptosystem of Halevi et al.  ... 
doi:10.1145/2590296.2590317 dblp:conf/ccs/AlawatugodaSB14 fatcat:j3xl3svq7vcpzbdrrcgllzn3ye

Continuous After-the-Fact Leakage-Resilient Key Exchange [chapter]

Janaka Alawatugoda, Colin Boyd, Douglas Stebila
2014 Lecture Notes in Computer Science  
We present a security model supporting continuous leakage even when the adversary learns certain ephemeral secrets or session keys, and give a generic construction of a two-pass leakage-resilient key exchange  ...  Security models for two-party authenticated key exchange (AKE) protocols have developed over time to provide security even when the adversary learns certain secret keys.  ...  public-key cryptosystems.  ... 
doi:10.1007/978-3-319-08344-5_17 fatcat:vxydfqytvndo5jwuizmjqyrkh4

Leakage-Resilient Certificateless Short Signature Scheme

Chen Xiaokui
2017 International Journal of Mechanical Engineering and Applications  
Compared to existing schemes, our new scheme has two advantages: (1) Our scheme is leakage-resilient certificateless short signature scheme; (2) Our Scheme is leakage-resilient signature scheme, and leaked  ...  For a certificateless short signature scheme to be applied in practical applications, it should without various leakage attacks.  ...  Acknowledgments The authors would like to thank the anonymous referees for their helpful comments.  ... 
doi:10.11648/j.ijmea.20170504.12 fatcat:tagilrizzvgjnjkntd7x2cviva

Hash Proof System Based on Lattice

Feng Xia, Bo Yang, Qiong Huang, Sha Ma
2012 International Journal of Advancements in Computing Technology  
We also show how to construct a public-key encryption scheme which is semantically secure against key-leakage attacks in the standard model using our HPS based on lattice.  ...  Compared with previous cryptosystem based on lattice, our construction needs bigger public key space but fewer operations during encryption, and can resist quantum attacks because of the assumption on  ...  [6] presented a generic construction of a public-key encryption scheme that is resilient to key leakage from any hash proof system and extended the framework of key leakage to the setting of chosen-ciphertext  ... 
doi:10.4156/ijact.vol4.issue8.1 fatcat:44gkrtfkvzcgngtjtbkk2jtmsm

Leakage-Resilient Cryptography from Minimal Assumptions [chapter]

Carmit Hazay, Adriana López-Alt, Hoeteck Wee, Daniel Wichs
2013 Lecture Notes in Computer Science  
In particular, we construct: -Leakage-resilient public-key encryption from any standard public-key encryption.  ...  These are the first constructions of leakage-resilient symmetric-key primitives that do not rely on public-key assumptions.  ...  Leakage-Resilient Public-Key Encryption We begin with a definition of leakage-resilient public-key encryption (PKE). Our definition is equivalent to that used by prior works [2, 43] .  ... 
doi:10.1007/978-3-642-38348-9_10 fatcat:dkjg7cfokjc2pf4ecwdtnn4mqu

Leakage-Resilient Cryptography from Minimal Assumptions

Carmit Hazay, Adriana López-Alt, Hoeteck Wee, Daniel Wichs
2015 Journal of Cryptology  
In particular, we construct: -Leakage-resilient public-key encryption from any standard public-key encryption.  ...  These are the first constructions of leakage-resilient symmetric-key primitives that do not rely on public-key assumptions.  ...  Leakage-Resilient Public-Key Encryption We begin with a definition of leakage-resilient public-key encryption (PKE). Our definition is equivalent to that used by prior works [2, 43] .  ... 
doi:10.1007/s00145-015-9200-x fatcat:iurakihu5zhlhol2tu6pximlk4

Leakage Resilient ElGamal Encryption [chapter]

Eike Kiltz, Krzysztof Pietrzak
2010 Lecture Notes in Computer Science  
Blinding is a popular and well-known countermeasure to protect public-key cryptosystems against side-channel attacks.  ...  ) is leakage resilient in the genericgroup model.  ...  In this paper, we address the problem of leakage resilient public-key encryption (PKE).  ... 
doi:10.1007/978-3-642-17373-8_34 fatcat:4ouifnbwfrhhtidq3gpcunthxm

On the leakage-resilient key exchange

Janaka Alawatugoda
2017 Journal of Mathematical Cryptology  
Further, we fix some flaws in security proofs of previous leakage-resilient key exchange protocols.  ...  In this paper we address the partial leakage of long-term secret keys of key exchange protocol participants due to various side-channel attacks.  ...  Acknowledgment: I would like to acknowledge Douglas Stebila, Colin Boyd and Tatsuaki Okamoto for numerous discussions on key exchange protocols and leakage-resilient cryptography.  ... 
doi:10.1515/jmc-2016-0003 fatcat:rfvikx5v2rhehhwebgdb4aiv5q

Vulnerability Bounds and Leakage Resilience of Blinded Cryptography under Timing Attacks

Boris Köpf, Geoffrey Smith
2010 2010 23rd IEEE Computer Security Foundations Symposium  
This result shows that, by considering (and justifying) more optimistic models of leakage than recent proposals for leakage-resilient cryptosystems, one can achieve provable resistance against side-channel  ...  Moreover, we show that any semantically secure public-key cryptosystem remains semantically secure in the presence of timing attacks, if the implementation is protected by blinding and bucketing.  ...  Naor and Segev [21] present a generic construction for leakage-resilient public-key cryptosystems from universal hash functions.  ... 
doi:10.1109/csf.2010.11 dblp:conf/csfw/KopfS10 fatcat:d5bwqnj2mfbujpd2a4gl6asgwu

A STUDY ON THE EXISTING THRESHOLD CRYPTOGRAPHY TECHNIQUES

Prabha Elizabeth Varghese, Department Of Computer Science School of Engineering, CUSAT Kerala, India
2020 International Journal of Advanced Research in Computer Science  
Encryption is done using a public key and the participating parties possess the corresponding private key. Thus for asymmetric key cryptography, threshold versions of encryptions can be built.  ...  In many leakage-resilient non-threshold cryptosystems, the leakage function is always applied to the only one available secret key.  ...  In the multi-key leakage-resilient model, security of dynamic threshold public key encryption and threshold ring signature is demonstrated.  ... 
doi:10.26483/ijarcs.v11i5.6659 fatcat:fpzqcdilmzd73afwyb32frymku

A Survey on Leakage-Resilient KASE for Group Data Sharing with Auxiliary Input via Cloud Storage

Payal Bhagat, Amar Buchade
2017 IJARCCE  
To address this problem we studied various leakage models.  ...  In this paper, we have discussed a few approaches for sharing data on cloud with minimal usage of key. We also discuss few data searching technique over encrypted data.  ...  Zhiwei Wang and Lingyu Zhou el at [2] proposed a leakage resilient key aggregate cryptosystem with auxiliary input which is based on Chu et al.'s construction [6] . III.  ... 
doi:10.17148/ijarcce.2017.6419 fatcat:u2tolz2zwzerngycoaopucqaie

Securing Computation against Continuous Leakage [chapter]

Shafi Goldwasser, Guy N. Rothblum
2010 Lecture Notes in Computer Science  
Our method uses as a building block a semantically secure subsidiary bit encryption scheme with the following additional operations: key refreshing, oblivious generation of cipher texts, leakage resilience  ...  The hardware component is independent of the encryption scheme secret key.  ...  It should be possible to "re-generate" leakage resilience on ciphertexts and keys: i.e., to take a ciphertext and secret key and repeatedly generate a new "random-looking" ciphertext and key pair, encrypting  ... 
doi:10.1007/978-3-642-14623-7_4 fatcat:q45ivi2cf5flxjbhz7hrljbdha
« Previous Showing results 1 — 15 out of 864 results