【24h】

Leakage Resilient ElGamal Encryption

机译:泄漏弹性伊尔尔格玛加密

获取原文

摘要

Blinding is a popular and well-known counter measure to protect public-key cryptosystems against side-channel attacks. The high level idea is to randomize an exponentiation in order to prevent multiple measurements of the same operation on different data, as such measurements might allow the adversary to learn the secret exponent. Several variants of blinding have been proposed in the literature, using additive or multiplicative secret-sharing to blind either the base or the exponent. These countermeasures usually aim at preventing particular side-channel attacks (mostly power analysis) and come without any formal security guarantee. In this work we investigate to which extend blinding can provide provable security against a general class of side-channel attacks. Surprisingly, it turns out that in the context of public-key encryption some blinding techniques are more suited than others. In particular, we consider a multiplicatively blinded version of ElGamal public-key encryption where - we prove that the scheme, instantiated over bilinear groups of prime order p (where p - 1 is not smooth) is leakage resilient in the generic- group model. Here we consider the model of chosen-ciphertext security in the presence of continuous leakage, i.e., the scheme remains chosen-ciphertext secure even if with every decryption query the adversary can learn a bounded amount (roughly log(p)/2 bits) of arbitrary, adversarially chosen information about the computation. - we conjecture that the scheme, instantiated over arbitrary groups of prime order p (where p - 1 is not smooth) is leakage resilient. Previous to this work no encryption scheme secure against continuous leakage was known. Constructing a scheme that can be proven secure in the standard model remains an interesting open problem.
机译:致盲是一种受欢迎的和着名的计数器,以保护公钥密码系统免受侧频攻击。高级思想是随机化指数,以防止在不同数据上进行相同操作的多次测量,因为此类测量可能允许对手学习秘密指数。在文献中提出了几种致盲的变体,使用添加剂或乘法秘密共享来盲目的基础或指数。这些对策通常旨在防止特定的侧通道攻击(主要是电源分析),并无任何正式的安全保证。在这项工作中,我们调查哪个延伸致盲可以针对一般侧面渠道攻击提供可提供的安全性。令人惊讶的是,事实证明,在公钥加密的背景下,一些令人致盲的技术比其他技术更加致盲。特别是,我们考虑一个乘以盲化版的Elgamal公钥加密,我们证明了在母线P(其中P-1不顺畅的PILING NOT SPONERD的BILINEAR组(其中P-1不平滑)上的方案进行了泄漏弹性。在这里,我们考虑在存在连续泄漏的情况下所选密文安全的模型,即,即使使用每个解密查询,该方案也保持了Chent-ChielText Secure,对手可以学习界限量(大致记录(P)/ 2位)关于计算的任意的,对接相关的信息。 - 我们猜想该方案,实体化在任意序列P(其中P - 1不平滑)是泄漏弹性。在此工作之前,已知不抵抗连续泄漏的加密方案。构建可以在标准模型中证明安全的方案仍然是一个有趣的公开问题。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号