首页> 外文OA文献 >Implementation of a leakage-resilient ElGamal key encapsulation mechanism
【2h】

Implementation of a leakage-resilient ElGamal key encapsulation mechanism

机译:防泄漏ElGamal密钥封装机制的实现

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

Leakage-resilient cryptography aims to extend the rigorous guarantees achieved through the provable security paradigm to physical implementations. The constructions designed on basis of this new approach inevitably suffer from an Achilles heel: a bounded leakage assumption is needed. Currently, a huge gap exists between the theory of such designs and their implementation to confirm the leakage resilience in practice. The present work tries to narrow this gap for the leakage-resilient bilinear ElGamal key encapsulation mechanism (BEG-KEM) proposed by Kiltz and Pietrzak in 2010. Our first contribution is a variant of the bounded leakage and the only-computation-leaks model that is closer to practice. We weaken the restriction on the image size of the leakage functions in these models and only insist that the inputs to the leakage functions have sufficient min-entropy left, in spite of the leakage, with no limitation on the quantity of this leakage. We provide a novel security reduction for BEG-KEM in this relaxed leakage model using the generic bilinear group axiom. Secondly, we show that a naive implementation of the exponentiation in BEG-KEM makes it impossible to meet the leakage bound. Instead of trying to find an exponentiation algorithm that meets the leakage axiom (which is a non-trivial problem in practice), we propose an advanced scheme, BEG-KEM+, that avoids exponentiation by a secret value, but rather uses an encoding into the base group due to Fouque and Tibouchi. Thirdly, we present a software implementation of BEG-KEM+ based on the Miracl library and provide detailed experimental results. We also assess its (theoretical) resistance against power analysis attacks from a practical perspective, taking into account the state-of-the-art in side-channel cryptanalysis.
机译:防泄漏加密技术旨在将通过可证明的安全范式实现的严格保证扩展到物理实现。基于这种新方法设计的结构不可避免地遭受了致命弱点:需要有一个有限的泄漏假设。当前,这种设计的理论与其实现之间存在巨大的差距,以在实践中确认泄漏的复原力。目前的工作试图缩小由Kiltz和Pietrzak在2010年提出的防泄漏弹性双线性ElGamal密钥封装机制(BEG-KEM)的差距。我们的第一个贡献是有界泄漏的变体和唯一计算泄漏模型,更接近实践。我们在这些模型中减弱了对泄漏函数的图像大小的限制,仅坚持要求尽管泄漏,泄漏函数的输入仍具有足够的最小熵,而对泄漏的数量没有限制。我们使用通用双线性组公理在这种宽松的泄漏模型中为BEG-KEM提供了一种新颖的安全性降低措施。其次,我们表明,在BEG-KEM中天真地实现幂运算无法满足泄漏范围。我们没有尝试找到满足泄漏公理的求幂算法(在实践中这是一个非平凡的问题),而是提出了一种高级方案BEG-KEM +,该方案避免了通过秘密值求幂的方法,而是对基本群是由于Fouque和Tibouchi。第三,我们基于Miracl库提出BEG-KEM +的软件实现,并提供详细的实验结果。我们还从实用角度评估了其(理论上)对功率分析攻击的抵抗力,同时考虑了旁通道密码分析的最新技术。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号