Fully Continuous Leakage-Resilient Certificate-Based Signcryption Scheme for Mobile Communications
نویسندگان
چکیده
Due to the popularity of mobile communication, many computing devices are exposed remote environments without physical protection so that these easily suffer from leakage attacks (e.g., side-channel attacks). Under such attacks, when a device performs some cryptographic algorithm, an adversary may acquire partial bits secret keys participated in this algorithm. To resist researchers offer leakage-resilient cryptography as solution. A signcryption scheme combines signing and encrypting processes simultaneously provide both authentication confidentiality, which is important primitive. Indeed, schemes under various public key system (PKS) settings were proposed. Unfortunately, still have two shortcomings, namely, bounded resilience conditionally continuous resilience. In paper, “fully” certificate-based (FCLR-CBSC) Security analysis formally proved show our possesses confidentiality against types adversaries PKS setting. Performance simulation experience suited run on PC device.
منابع مشابه
Certificate-Based Encryption Resilient to Key Leakage
Certificate-based encryption (CBE) is an important class of public key encryption but the existing schemes are secure only under the premise that the decryption key (or private key) and master private key are absolutely secret. In fact, a lot of side channel attacks and cold boot attacks can leak secret information of a cryptographic system. In this case, the security of the cryptographic syste...
متن کاملFully Leakage-Resilient Codes
Leakage resilient codes (LRCs) are probabilistic encoding schemes that guarantee message hiding even under some bounded leakage on the codeword. We introduce the notion of fully leakage resilient codes (FLRCs), where the adversary can leak λ0 bits from the encoding process, namely, the message and the randomness involved during the encoding process. In addition the adversary can as usual leak f...
متن کاملCertificate-Based Secure Three-Party Signcryption Scheme with Low Costs
A signcryption scheme combining public key encryption and digital signatures can simultaneously satisfy the security requirements of confidentiality, integrity, authenticity and non-repudiation. In a three-party communication environment, a message signcrypted by one party might have to be securely delivered to the other two and they usually independently decrypt the ciphertext and verify recov...
متن کاملLeakage Resilient Fully Homomorphic Encryption
We construct the first leakage resilient variants of fully homomorphic encryption (FHE) schemes. Our leakage model is bounded adaptive leakage resilience. We first construct a leakageresilient leveled FHE scheme, meaning the scheme is both leakage resilient and homomorphic for all circuits of depth less than some pre-established maximum set at the time of key generation. We do so by applying id...
متن کاملLeakage-Resilient Layout Randomization for Mobile Devices
Attack techniques based on code reuse continue to enable real-world exploits bypassing all current mitigations. Code randomization defenses greatly improve resilience against code reuse. Unfortunately, sophisticated modern attacks such as JITROP can circumvent randomization by discovering the actual code layout on the target and relocating the attack payload on the fly. Hence, effective code ra...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Informatica (lithuanian Academy of Sciences)
سال: 2022
ISSN: ['1822-8844', '0868-4952']
DOI: https://doi.org/10.15388/22-infor506