Hierarchical and Efficient Identity-bsed Encryption Against Side Channel Attacks
نویسندگان
چکیده
Hierarchical and identity-based encryption (HIBE) is very valuable widely used in many occasions. In the Internet of Things based on cloud services, efficient HIBE likely to be applied service scenarios for limited computing ability some terminal devices. What’s more, because insecurity cryptographic systems caused by side channel attacks, design leakage resilient scheme has attracted more cryptography researchers' attention. this study, an constructed. (1) essence, given contains a hierarchical ID-based key encapsulation system. By using extractor act encapsulated symmetric key, proposed may resist disclosure due attacks. The relative ratio close 1. (2) We also construct hash proof system that provides security our scheme. can not only but short public parameters computational efficiency, which suitable applications environment. (3) There no limit hierarchy depth system, maximum length required when initialized.
منابع مشابه
Defend encryption systems against side- channel attacks
From its ancient origin as a tool for protecting sensitive wartime or espionage-related messages, cryptography has become a foundational building-block for securing the systems, protocols, and infrastructure that underpin our modern interconnected world. But the physical mechanisms used in performing encryption and decryption can leak information, making it possible to bypass this security. Pro...
متن کاملWhitenoise Encryption Implementation with Increased Robustness against Side-Channel Attacks
Two circuit design techniques improve the robustness of Whitenoise encryption algorithm implementation against side-channel attacks based on dynamic and/or static power consumption. The first technique aims to conceal the power consumption and has linear cost. The second technique aims to randomize the power consumption and has quadratic cost. These techniques are not mutual exclusive; their sy...
متن کاملISAP - Authenticated Encryption Inherently Secure Against Passive Side-Channel Attacks
Side-channel attacks and in particular differential power analysis (DPA) attacks pose a serious threat to cryptographic implementations. One approach to counteract such attacks are cryptographic schemes based on fresh re-keying. In settings of pre-shared secret keys, such schemes render DPA infeasible by deriving session keys and by ensuring that the attacker cannot collect side-channel leakage...
متن کاملSide-Channel Attacks on Textbook RSA and ElGamal Encryption
This paper describes very efficient attacks on plain RSA encryption as usually described in textbooks. These attacks exploit side channels caused by implementations that, during decryption, incorrectly make certain assumption on the size of message. We highlight different assumptions that are easily made when implementing plain RSA decryption and present corresponding attacks. These attacks mak...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Advanced Computer Science and Applications
سال: 2023
ISSN: ['2158-107X', '2156-5570']
DOI: https://doi.org/10.14569/ijacsa.2023.0140667