نتایج جستجو برای: leakage resilient
تعداد نتایج: 45562 فیلتر نتایج به سال:
Smooth projective hashing was firstly introduced by Cramer and Shoup (EuroCrypt’02) as a tool to construct efficient chosen-ciphertext-secure public key encryption schemes. Since then, they have found many other applications, such as password-based authenticated key exchange, oblivious transfer, zero-knowledge arguments et al. Certificate-based encryption (CBE) not only eliminates third-party q...
In this work, we show that strong leakage resilience for cryptosystems with advanced functionalitiescan be obtained quite naturally within the methodology of dual system encryption, recently introducedby Waters. We demonstrate this concretely by providing fully secure IBE, HIBE, and ABE systems whichare resilient to bounded leakage from each of many secret keys per user, as well as ...
A leakage-resilient cryptosystem remains secure even if arbitrary, but bounded, information about the secret key (and possibly other internal state information) is leaked to an adversary. Denote the length of the secret key by n. We show: – A full-fledged signature scheme tolerating leakage of ( 1− n− ) · n bits of information about the secret key (for any constant < 1), based on general assump...
Much of modern cryptography is predicated on the assumption that users have secrets which are generated using perfect randomness, and kept perfectly secret from an attacker. The attacker is then constrained to black-box (input/output) access to the user’s program. In reality, neither assumption holds, as evidenced by numerous side-channel attacks that have surfaced over the last few decades. Th...
Physical cryptographic devices inadvertently leak information through numerous side-channels. Such leakage is exploited by socalled side-channel attacks, which often allow for a complete security breache. A recent trend in cryptography is to propose formal models to incorporate leakage into the model and to construct schemes that are provably secure within them. We design a general compiler tha...
Security models for two-party authenticated key exchange (AKE) protocols have developed overtime to capture the security of AKE protocols even when the adversary learns certain secret values.Increased granularity of security can be modelled by considering partial leakage of secrets in themanner of models for leakage-resilient cryptography, designed to capture side-channel attacks. I...
Certificate-based encryption (CBE) is an important class of public key encryption but the existing schemes are secure only under the premise that the decryption key (or private key) and master private key are absolutely secret. In fact, a lot of side channel attacks and cold boot attacks can leak secret information of a cryptographic system. In this case, the security of the cryptographic syste...
We propose the first leakage-resilient Identity-Based Encryption (IBE) scheme with full domain hash structure. Our scheme is leakageresilient in the relative leakage model and the random oracle model under the decisional bilinear Diffie-Hellman (DBDH) assumption.
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید