首页> 外文期刊>IEEE transactions on information forensics and security >Provable Order Amplification for Code-Based Masking: How to Avoid Non-Linear Leakages Due to Masked Operations
【24h】

Provable Order Amplification for Code-Based Masking: How to Avoid Non-Linear Leakages Due to Masked Operations

机译:基于代码的掩膜的可证明的顺序放大:如何避免由于掩膜操作导致的非线性泄漏

获取原文
获取原文并翻译 | 示例

摘要

Code-based masking schemes have been shown to provide higher theoretical security guarantees than Boolean masking. In particular, one interesting feature put forward at CARDIS 2016 and then analyzed at CARDIS 2017 was the so-called security order amplification: under the assumption that the leakage function is linear, it guarantees that an implementation performing only linear operations will have a security order in the bounded moment leakage model larger than d - 1, where d is the number of shares. The main question regarding this feature is its practical relevance. First of all, concrete block ciphers do not only perform linear operations. Second, it may be that actual leakage functions are not perfectly linear (raising questions regarding what happens when one deviates from such assumptions). In this paper, we show that the issue of only linear operations can be provably avoided and that it is possible to obtain security order amplification for any functionality to implement. We then show that (not so) slightly non-linear leakage functions do not annihilate the nice properties (i.e., that the code-based schemes we consider remain interesting compared to the Boolean masking). We conclude with a performance evaluation of the proposals, showing that the performance overheads are moderate for a reasonable number of shares (we studied when the number of the shares d = 2,3,4). In additiona, our results could be specified to the case of provable security for low entropy masking, which can be considered as a side bonus of our contributions. We give some preliminary results on how to construct the low entropy masking schemes with provable high security order against linear leakage.
机译:与基于布尔的掩码相比,基于代码的掩码方案已提供了更高的理论安全性保证。特别是,在CARDIS 2016上提出并随后在CARDIS 2017上进行分析的一个有趣的功能是所谓的安全顺序放大:在假设泄漏函数为线性的情况下,它保证仅执行线性操作的实现具有安全顺序在大于d-1的有界矩泄漏模型中,其中d是份额数。有关此功能的主要问题是其实用性。首先,具体的分组密码不仅执行线性运算。第二,可能是实际的泄漏函数不是完全线性的(提出了一个问题,当人们偏离这些假设时会发生什么)。在本文中,我们证明了可以证明避免仅使用线性运算的问题,并且可以针对任何要实现的功能获得安全性级放大。然后,我们证明(不是这样)略微非线性的泄漏函数不会消除良好的特性(即与布尔掩码相比,我们认为基于代码的方案仍然很有趣)。最后,我们对建议进行了绩效评估,结果表明,对于合理数量的股票,绩效开销是适度的(我们研究了当股票数量d = 2,3,4时)。此外,我们的结果可以用于可证明的低熵掩蔽安全性案例,这可以视为我们贡献的附带奖励。我们给出了一些初步的结果,说明如何构建具有可证明的高安全性的低熵掩蔽方案,以防止线性泄漏。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号