首页> 外文会议>International Conference on the Theory and Application of Cryptology and Information Security >Efficient Public-Key Cryptography with Bounded Leakage and Tamper Resilience
【24h】

Efficient Public-Key Cryptography with Bounded Leakage and Tamper Resilience

机译:高效的公钥加密,具有有界泄漏和篡改弹性

获取原文

摘要

We revisit the question of constructing public-key encryption and signature schemes with security in the presence of bounded leakage and tampering memory attacks. For signatures we obtain the first construction in the standard model; for public-key encryption we obtain the first construction free of pairing (avoiding non-interactive zero-knowledge proofs). Our constructions are based on generic building blocks, and, as we show, also admit efficient instantiations under fairly standard number-theoretic assumptions. The model of bounded tamper resistance was recently put forward by Damgard et al. (Asiacrypt 2013) as an attractive path to achieve security against arbitrary memory tampering attacks without making hardware assumptions (such as the existence of a protected self-destruct or key-update mechanism), the only restriction being on the number of allowed tampering attempts (which is a parameter of the scheme). This allows to circumvent known impossibility results for unrestricted tampering (Gennaro et al., TCC 2010), while still being able to capture realistic tampering attacks.
机译:我们重新审视在存在有限泄漏和篡改内存攻击的情况下,通过安全构建公钥加密和签名方案的问题。对于签名,我们在标准模型中获得第一个结构;对于公钥加密,我们可以免费获得第一座,免费配对(避免非交互式零知识证明)。我们的结构基于通用构建块,并且正如我们所展示的那样,也承认了在公平标准的数字 - 理论假设下的有效实例化。最近由Damgard等人提出了有界篡改电阻的模型。 (亚洲亚洲2013年)作为达到任意内存的安全性的有吸引力的路径,而无需制造硬件假设(例如受保护的自毁或键更新机制的存在),唯一限制就是允许篡改尝试的数量(这是该方案的参数)。这允许为不受限制的篡改(Gennaro等,TCC 2010)规避已知的不可能性结果,同时仍然能够捕获现实的篡改攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号