首页> 外文会议>ACM symposium on principles of distributed computing >Distributed Public Key Schemes Secure against Continual Leakage
【24h】

Distributed Public Key Schemes Secure against Continual Leakage

机译:分布式公钥计划安全防止持续泄漏

获取原文

摘要

In this work we study distributed public key schemes secure against continual memory leakage. The secret key will be shared among two computing devices communicating over a public channel, and the decryption operation will be computed by a simple 2-party protocol between the devices. Similarly, the secret key shares will be periodically refreshed by a simple 2-party protocol executed in discrete time periods throughout the lifetime of the system. The leakage adversary can choose pairs, one per device, of polynomial time computable length shrinking (or entropy shrinking) functions, and receive the value of the respective function on the internal state of the respective device (namely, on its secret share, internal randomness, and results of intermediate computations). We present distributed public key encryption (DPKE) and distributed identity based encryption (DIBE) schemes that are secure against continual memory leakage, under the Bilinear Decisional Diffie-Hellman and 2-linear assumptions. Our schemes have the following properties: 1. Our DPKE and DIBE schemes tolerate leakage at all times, including during refresh. During refresh the tolerated leakage is a (1/2-ο(1),1) -fraction of the secret memory of P_1, P_2 respectively; and at all other times (post key generation) the tolerated leakage is a ((1-ο(1)),1) -fraction of the secret, memory of P_1, P_2 respectively. 2. Our DIBE scheme tolerates leakage from both the master secret key and the identity based secret keys. 3. Our DPKE scheme is CCA2-secure against continual memory leakage. 4. Our DPKE scheme also implies a secure storage system on leaky devices, where a value s can be secretely stored on devices that continually leak information about their internal state to an external attacker. The devices go through a periodic refresh protocol. These properties improve on bounds and properties of known constructions designed to be secure against continual memory leakage in the single processor model.
机译:在这项工作中,我们研究了分布式公钥计划,防止持续内存泄漏。秘密密钥将在通过公共信道通信的两个计算设备之间共享,并且解密操作将通过设备之间的简单2方协议计算。类似地,秘密密钥股票将通过在系统的一生中的离散时间段中在离散时间段中执行的简单2方协议进行周期性刷新。泄漏对手可以选择成对,每个设备,多项式时间可计算长度缩小(或熵收缩)函数,并在相应设备的内部状态上接收相应功能的值(即,在其秘密共享,内部随机性上和中间计算的结果)。我们在双线性策略Diffie-Hellman和2线性假设下,我们呈现了对持续内存泄漏的基于持续内存泄漏的分布式公钥加密(DPKE)和分布式的Identity的加密(DIBE)方案。我们的计划具有以下属性:1。我们的DPKE和DIBE计划始终容忍泄漏,包括在刷新过程中。在刷新过程中,容忍泄漏是P_1,P_2的秘密记忆的(分别为P_2的秘密记忆;并且在所有其他时候(发布键生成),容忍的泄漏是a((1-ο(1)),1) - 分别为P_1,P_2的存储器。 2.我们的DIBE计划容忍主秘密密钥和基于身份的秘密密钥的泄漏。我们的DPKE方案是CCA2 - 防止持续内存泄漏。 4.我们的DPKE方案还暗示泄漏设备上的安全存储系统,其中值S可以秘密地存储在将关于其内部状态的信息泄漏到外部攻击者的设备上。设备通过定期刷新协议。这些属性改善了已知结构的界限和性质,该结构被设计为固定在单个处理器模型中的持续内存泄漏。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号