A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Public-Key Cryptosystems Resilient to Key Leakage
2012
SIAM journal on computing (Print)
In the setting of public-key encryption, Akavia et al. showed that Regev's lattice-based scheme (STOC '05) is resilient to any leakage of L/polylog(L) bits, where L is the length of the secret key. ...
In this paper we revisit the above-mentioned framework and our main results are as follows: • We present a generic construction of a public-key encryption scheme that is resilient to key leakage from any ...
[10] is also resilient to key leakage attacks. ...
doi:10.1137/100813464
fatcat:esy7hizicnhfnlrjhfns3cvc3i
Public-Key Cryptosystems Resilient to Key Leakage
[chapter]
2009
Lecture Notes in Computer Science
In the setting of public-key encryption, Akavia et al. showed that Regev's lattice-based scheme (STOC '05) is resilient to any leakage of L/polylog(L) bits, where L is the length of the secret key. ...
In this paper we revisit the above-mentioned framework and our main results are as follows: • We present a generic construction of a public-key encryption scheme that is resilient to key leakage from any ...
[10] is also resilient to key leakage attacks. ...
doi:10.1007/978-3-642-03356-8_2
fatcat:l2heok44bnbydfgovvnjj2hux4
Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions
[chapter]
2016
Lecture Notes in Computer Science
We present the first chosen-ciphertext secure public-key encryption schemes resilient to continuous tampering of arbitrary (efficiently computable) functions. ...
As in the previous works resilient to this type of tampering attacks, our schemes also tolerate bounded or continuous memory leakage attacks at the same time. ...
Introduction We study the tampering attack security, or equivalently the related-key attack security, of public-key cryptosystems. ...
doi:10.1007/978-3-662-53887-6_33
fatcat:bxvtpj5pcvfpjd4eigly6jkt54
Modelling after-the-fact leakage for key exchange
2014
Proceedings of the 9th ACM symposium on Information, computer and communications security - ASIA CCS '14
public-key cryptosystem. ...
We identify a special property for public-key cryptosystems: pair generation indistinguishability, and show how to obtain the leakage-resilient NAXOS trick from a pair generation indistinguishable leakage-resilient ...
Thus, the leakage-resilient public-key cryptosystem of Naor et al. is 0-PG-IND. The generic CPLA2-secure public-key cryptosystem of Halevi et al. ...
doi:10.1145/2590296.2590317
dblp:conf/ccs/AlawatugodaSB14
fatcat:j3xl3svq7vcpzbdrrcgllzn3ye
Continuous After-the-Fact Leakage-Resilient Key Exchange
[chapter]
2014
Lecture Notes in Computer Science
We present a security model supporting continuous leakage even when the adversary learns certain ephemeral secrets or session keys, and give a generic construction of a two-pass leakage-resilient key exchange ...
Security models for two-party authenticated key exchange (AKE) protocols have developed over time to provide security even when the adversary learns certain secret keys. ...
public-key cryptosystems. ...
doi:10.1007/978-3-319-08344-5_17
fatcat:vxydfqytvndo5jwuizmjqyrkh4
Leakage-Resilient Certificateless Short Signature Scheme
2017
International Journal of Mechanical Engineering and Applications
Compared to existing schemes, our new scheme has two advantages: (1) Our scheme is leakage-resilient certificateless short signature scheme; (2) Our Scheme is leakage-resilient signature scheme, and leaked ...
For a certificateless short signature scheme to be applied in practical applications, it should without various leakage attacks. ...
Acknowledgments The authors would like to thank the anonymous referees for their helpful comments. ...
doi:10.11648/j.ijmea.20170504.12
fatcat:tagilrizzvgjnjkntd7x2cviva
Hash Proof System Based on Lattice
2012
International Journal of Advancements in Computing Technology
We also show how to construct a public-key encryption scheme which is semantically secure against key-leakage attacks in the standard model using our HPS based on lattice. ...
Compared with previous cryptosystem based on lattice, our construction needs bigger public key space but fewer operations during encryption, and can resist quantum attacks because of the assumption on ...
[6] presented a generic construction of a public-key encryption scheme that is resilient to key leakage from any hash proof system and extended the framework of key leakage to the setting of chosen-ciphertext ...
doi:10.4156/ijact.vol4.issue8.1
fatcat:44gkrtfkvzcgngtjtbkk2jtmsm
Leakage-Resilient Cryptography from Minimal Assumptions
[chapter]
2013
Lecture Notes in Computer Science
In particular, we construct: -Leakage-resilient public-key encryption from any standard public-key encryption. ...
These are the first constructions of leakage-resilient symmetric-key primitives that do not rely on public-key assumptions. ...
Leakage-Resilient Public-Key Encryption We begin with a definition of leakage-resilient public-key encryption (PKE). Our definition is equivalent to that used by prior works [2, 43] . ...
doi:10.1007/978-3-642-38348-9_10
fatcat:dkjg7cfokjc2pf4ecwdtnn4mqu
Leakage-Resilient Cryptography from Minimal Assumptions
2015
Journal of Cryptology
In particular, we construct: -Leakage-resilient public-key encryption from any standard public-key encryption. ...
These are the first constructions of leakage-resilient symmetric-key primitives that do not rely on public-key assumptions. ...
Leakage-Resilient Public-Key Encryption We begin with a definition of leakage-resilient public-key encryption (PKE). Our definition is equivalent to that used by prior works [2, 43] . ...
doi:10.1007/s00145-015-9200-x
fatcat:iurakihu5zhlhol2tu6pximlk4
Leakage Resilient ElGamal Encryption
[chapter]
2010
Lecture Notes in Computer Science
Blinding is a popular and well-known countermeasure to protect public-key cryptosystems against side-channel attacks. ...
) is leakage resilient in the genericgroup model. ...
In this paper, we address the problem of leakage resilient public-key encryption (PKE). ...
doi:10.1007/978-3-642-17373-8_34
fatcat:4ouifnbwfrhhtidq3gpcunthxm
On the leakage-resilient key exchange
2017
Journal of Mathematical Cryptology
Further, we fix some flaws in security proofs of previous leakage-resilient key exchange protocols. ...
In this paper we address the partial leakage of long-term secret keys of key exchange protocol participants due to various side-channel attacks. ...
Acknowledgment: I would like to acknowledge Douglas Stebila, Colin Boyd and Tatsuaki Okamoto for numerous discussions on key exchange protocols and leakage-resilient cryptography. ...
doi:10.1515/jmc-2016-0003
fatcat:rfvikx5v2rhehhwebgdb4aiv5q
Vulnerability Bounds and Leakage Resilience of Blinded Cryptography under Timing Attacks
2010
2010 23rd IEEE Computer Security Foundations Symposium
This result shows that, by considering (and justifying) more optimistic models of leakage than recent proposals for leakage-resilient cryptosystems, one can achieve provable resistance against side-channel ...
Moreover, we show that any semantically secure public-key cryptosystem remains semantically secure in the presence of timing attacks, if the implementation is protected by blinding and bucketing. ...
Naor and Segev [21] present a generic construction for leakage-resilient public-key cryptosystems from universal hash functions. ...
doi:10.1109/csf.2010.11
dblp:conf/csfw/KopfS10
fatcat:d5bwqnj2mfbujpd2a4gl6asgwu
A STUDY ON THE EXISTING THRESHOLD CRYPTOGRAPHY TECHNIQUES
2020
International Journal of Advanced Research in Computer Science
Encryption is done using a public key and the participating parties possess the corresponding private key. Thus for asymmetric key cryptography, threshold versions of encryptions can be built. ...
In many leakage-resilient non-threshold cryptosystems, the leakage function is always applied to the only one available secret key. ...
In the multi-key leakage-resilient model, security of dynamic threshold public key encryption and threshold ring signature is demonstrated. ...
doi:10.26483/ijarcs.v11i5.6659
fatcat:fpzqcdilmzd73afwyb32frymku
A Survey on Leakage-Resilient KASE for Group Data Sharing with Auxiliary Input via Cloud Storage
2017
IJARCCE
To address this problem we studied various leakage models. ...
In this paper, we have discussed a few approaches for sharing data on cloud with minimal usage of key. We also discuss few data searching technique over encrypted data. ...
Zhiwei Wang and Lingyu Zhou el at [2] proposed a leakage resilient key aggregate cryptosystem with auxiliary input which is based on Chu et al.'s construction [6] .
III. ...
doi:10.17148/ijarcce.2017.6419
fatcat:u2tolz2zwzerngycoaopucqaie
Securing Computation against Continuous Leakage
[chapter]
2010
Lecture Notes in Computer Science
Our method uses as a building block a semantically secure subsidiary bit encryption scheme with the following additional operations: key refreshing, oblivious generation of cipher texts, leakage resilience ...
The hardware component is independent of the encryption scheme secret key. ...
It should be possible to "re-generate" leakage resilience on ciphertexts and keys: i.e., to take a ciphertext and secret key and repeatedly generate a new "random-looking" ciphertext and key pair, encrypting ...
doi:10.1007/978-3-642-14623-7_4
fatcat:q45ivi2cf5flxjbhz7hrljbdha
« Previous
Showing results 1 — 15 out of 864 results