【24h】

Key-Insulated Public Key Cryptosystems

机译:密钥隔离的公钥密码系统

获取原文
获取原文并翻译 | 示例

摘要

Cryptographic computations (decryption, signature generation, etc.) are often performed on a relatively insecure device (e.g., a mobile device or an Internet-connected host) which cannot be trusted to maintain secrecy of the private key. We propose and investigate the notion of key-insulated security whose goal is to minimize the damage caused by secret-key exposures. In our model, the secret key(s) stored on the insecure device are refreshed at discrete time periods via interaction with a physically-secure - but computationally-limited - device which stores a "master key". All cryptographic computations are still done on the insecure device, and the public key remains unchanged. In a (t, N)-key-insulated scheme, an adversary who compromises the insecure device and obtains secret keys for up to t periods of his choice is unable to violate the security of the cryptosystem for any of the remaining N - t periods. Furthermore, the scheme remains secure (for all time periods) against an adversary who compromises only the physically-secure device. We focus primarily on key-insulated public-key encryption. We construct a (t, N)-key-insulated encryption scheme based on any (standard) public-key encryption scheme, and give a more efficient construction based on the DDH assumption. The latter construction is then extended to achieve chosen-ciphertext security.
机译:密码计算(解密,签名生成等)通常在相对不安全的设备(例如,移动设备或与互联网相连的主机)上执行,该设备不能被信任来维持私钥的保密性。我们提出并研究了密钥隔离安全性的概念,其目的是最大程度地减少由秘密密钥暴露造成的损害。在我们的模型中,存储在不安全设备上的秘密密钥通过与存储“主密钥”的物理安全但受计算限制的设备交互,在不连续的时间段刷新。所有加密计算仍在不安全的设备上进行,并且公钥保持不变。在(t,N)密钥隔离方案中,攻击者在选择的t时期内破坏了不安全的设备并获得了秘密密钥的对手无法在其余N-t时期中的任何时间违反密码系统的安全性。此外,该方案对于所有只破坏物理安全设备的对手仍然保持安全(在所有时间段内)。我们主要专注于密钥隔离的公共密钥加密。我们基于任何(标准)公钥加密方案构造(t,N)密钥绝缘的加密方案,并基于DDH假设给出更有效的构造。然后扩展后者的结构以实现选择的密文安全性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号