Hardware security without secure hardware: How to decrypt with a password and a server
نویسندگان
چکیده
Hardware security tokens have now been used for several decades to store cryptographic keys. When deployed, the of corresponding schemes fundamentally relies on tamper-resistance – a very strong assumption in practice. Moreover, even secure tokens, which are expensive and cumbersome, can often be subverted. We introduce new primitive called Encryption with Password-protected Assisted Decryption (EPAD schemes), user's decryption key is shared between user device (or token) no made, an online server. The shares human-memorizable password To decrypt ciphertext, launches, from public computer, distributed protocol server, authenticating herself server her (unknown device); such way that secret never reconstructed during interaction. propose model guarantees (1) efficient adversary infer any information about plaintexts, it must know corrupted (secrecy guaranteed if only one two conditions fulfilled), (2) unable ciphertexts they help (even though could together reconstruct key), (3) able verify both performed expected computations. These EPAD password-only model, meaning not required remember trusted key, remains safe she led interact wrong malicious device. then give practical pairixng-based scheme. Our construction provably under standard computational assumptions, using non-interactive proof systems efficiently instantiated i.e., without relying random oracle heuristic.
منابع مشابه
How to Compute under AC Leakage without Secure Hardware
We study the problem of computing securely in the presence of leakage on the computation’s internals. Our main result is a general compiler that compiles any algorithm P , viewed as a boolean circuit, into a functionally equivalent algorithm P ′. The compiled P ′ can then be run repeatedly on adversarially chosen inputs in the presence of leakage on its internals: In each execution of P ′, an A...
متن کاملHow to Compute under AC Leakage without Secure Hardware
We study the problem of computing securely in the presence of leakage on the computation’s internals. Our main result is a general compiler that compiles any algorithm P , viewed as a boolean circuit, into a functionally equivalent algorithm P ′. The compiled P ′ can then be run repeatedly on adversarially chosen inputs in the presence of leakage on its internals. In particular, in each executi...
متن کاملa comparison of teachers and supervisors, with respect to teacher efficacy and reflection
supervisors play an undeniable role in training teachers, before starting their professional experience by preparing them, at the initial years of their teaching by checking their work within the proper framework, and later on during their teaching by assessing their progress. but surprisingly, exploring their attributes, professional demands, and qualifications has remained a neglected theme i...
15 صفحه اولA Novel and Efficient Hardware Implementation of Scalar Point Multiplier
A new and highly efficient architecture for elliptic curve scalar point multiplication is presented. To achieve the maximum architectural and timing improvements we have reorganized and reordered the critical path of the Lopez-Dahab scalar point multiplication architecture such that logic structures are implemented in parallel and operations in the critical path are diverted to noncritical path...
متن کاملIntroduction to Hardware Security
Hardware security has become a hot topic recently with more and more researchers from related research domains joining this area. However, the understanding of hardware security is often mixed with cybersecurity and cryptography, especially cryptographic hardware. For the same reason, the research scope of hardware security has never been clearly defined. To help researchers who have recently j...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Theoretical Computer Science
سال: 2021
ISSN: ['1879-2294', '0304-3975']
DOI: https://doi.org/10.1016/j.tcs.2021.09.042