搜索结果: 1-12 共查到“军队指挥学 leakage-resilience”相关记录12条 . 查询时间(0.046 秒)
On the Local Leakage Resilience of Linear Secret Sharing Schemes
Secret Sharing leakage resilience information theory
2019/6/5
We consider the following basic question: to what extent are standard secret sharing schemes and protocols for secure multiparty computation that build on them resilient to leakage? We focus on a simp...
Towards Lightweight Side-Channel Security and the Leakage-Resilience of the Duplex Sponge
Authenticated Encryption Duplex Construction Leakage-Resilience
2019/3/1
Authenticated Encryption (AE) has become the de facto standard for encryption in modern protocols, and the ubiquitous deployment of small connected devices naturally calls for the availability of ligh...
Side-channel attacks, especially differential power analysis (DPA), pose a serious threat to cryptographic implementations deployed in a malicious environment. One way to counter side-channel attacks ...
Non-Malleable Secret Sharing in the Computational Setting: Adaptive Tampering, Noisy-Leakage Resilience, and Improved Rate
secret sharing non-malleability leakage resilience computational security
2019/2/27
We revisit the concept of *non-malleable* secret sharing (Goyal and Kumar, STOC 2018) in the computational setting. In particular, under the assumption of one-to-one one-way functions, we exhibit a *c...
On the Leakage Resilience of Ideal-Lattice Based Public Key Encryption
lattice-based cryptography leakage resilience Ring-LWE
2017/11/27
We consider the leakage resilience of the Ring-LWE analogue of the Dual-Regev encryption scheme (R-Dual-Regev for short), originally presented by Lyubashevsky et al. (Eurocrypt '13). Specifically, we ...
Anonymous IBE, Leakage Resilience and Circular Security from New Assumptions
identity-based encryption anonymity leakage resilience
2017/10/9
In anonymous identity-based encryption (IBE), ciphertexts not only hide their corresponding messages, but also their target identity. We construct an anonymous IBE scheme based on the Computational Di...
Iterated group products and leakage resilience against NC^1
leakage-resilient cryptography iterated group products
2014/3/5
We show that if NC^1 \neq L, then for every element g of the alternating group A_t, circuits of depth O(log t) cannot distinguish between a uniform vector over (A_t)^t with product = g and one with pr...
A leakage resilient encryption scheme is one which stays secure even against an attacker that obtains a bounded amount of side information on the secret key (say $\lambda$ bits of ``leakage''). A fund...
A Parallel Repetition Theorem for Leakage Resilience
foundations resilient independent keys
2011/6/9
A leakage resilient encryption scheme is one which stays secure even against an attacker that obtains a bounded amount of side information on the secret key (say $\lambda$ bits of ``leakage''). A fund...
Achieving Leakage Resilience Through Dual System Encryption
Leakage Resilience Dual System Encryption
2010/8/17
In this work, we show that strong leakage resilience for cryptosystems with advanced functionalities can be obtained quite naturally within the methodology of dual system encryption, recently introduc...
Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs
Garbled Circuit Hardware Implementation Leakage-Resilience One-Time Programs Secure Function Evaluation
2010/7/13
The power of side-channel leakage attacks on cryptographic implementations is evident. Today's practical defenses are typically attack-specific countermeasures against certain classes of side-channel ...
Signature Schemes with Bounded Leakage Resilience
leakage-resilient cryptosystem Signature Schemes Bounded Leakage Resilience
2009/6/12
A leakage-resilient cryptosystem remains secure even if arbitrary, but bounded, information
about the secret key (or possibly other internal state information) is leaked to an adversary.
Denote the ...