PUBLIC-KEY CRYPTOSYSTEMS RESILIENT TO KEY LEAKAGE

被引:68
|
作者
Naor, Moni [1 ]
Segev, Gil [2 ]
机构
[1] Weizmann Inst Sci, Dept Comp Sci & Appl Math, IL-76100 Rehovot, Israel
[2] Microsoft Res, Mountain View, CA 94043 USA
基金
以色列科学基金会;
关键词
public-key encryption; leakage-resilient cryptography; CIRCULAR-SECURE ENCRYPTION; CRYPTOGRAPHIC PRIMITIVES; HYBRID ENCRYPTION; PRIVATE CIRCUITS; SCHEMES; PARADIGM; EXTRACTORS;
D O I
10.1137/100813464
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Most of the work in the analysis of cryptographic schemes is concentrated in abstract adversarial models that do not capture side-channel attacks. Such attacks exploit various forms of unintended information leakage, which is inherent to almost all physical implementations. Inspired by recent side-channel attacks, especially the "cold boot attacks" of Halderman et al. [Proceedings of the 17th USENIX Security Symposium, San Jose, CA, 2008, pp. 45-60], Akavia, Goldwasser, and Vaikuntanathan [Proceedings of the 6th IACR Theory of Cryptography Conference, San Francisco, CA, 2009, pp. 474-495] formalized a realistic framework for modeling the security of encryption schemes against a wide class of side-channel attacks in which adversarially chosen functions of the secret key are leaked. In the setting of public-key encryption, they showed that Regev's lattice-based scheme [Proceedings of the 37th Annual ACM Symposium on Theory of Computing, Baltimore, MD, 2005, pp. 84-93] is resilient to any leakage of L/polylog(L) bits, where L is the length of the secret key. In this paper we revisit the above-mentioned framework and our main results are as follows. (A) We present a generic construction of a public-key encryption scheme that is resilient to key leakage from any hash proof system. The construction does not rely on additional computational assumptions, and the resulting scheme is as efficient as the underlying hash proof system. Existing constructions of hash proof systems imply that our construction can be based on a variety of number-theoretic assumptions, including the decisional Diffie-Hellman assumption (and its progressively weaker d-linear variants), the quadratic residuosity assumption, and Paillier's composite residuosity assumption. (B) We construct a new hash proof system based on the decisional Diffie-Hellman assumption (and its d-linear variants) and show that the resulting scheme is resilient to any leakage of L(1 - o(1)) bits. In addition, we prove that the recent scheme of Boneh et al. [Advances in Cryptology-CRYPTO'08, Santa Barbara, CA, 2008, pp. 108-125], constructed to be a "circular-secure" encryption scheme, fits our generic approach and is also resilient to any leakage of L(1 - o(1)) bits. (C) We extend the framework of key leakage to the setting of chosen-ciphertext attacks. On the theoretical side, we prove that the Naor-Yung paradigm is applicable in this setting as well, and obtain as a corollary encryption schemes that are CCA2-secure with any leakage of L(1 - o(1)) bits. On the practical side, we prove that variants of the Cramer-Shoup cryptosystem (along the lines of our generic construction) are CCA1-secure with any leakage of L/4 bits, and CCA2-secure with any leakage of L/6 bits.
引用
收藏
页码:772 / 814
页数:43
相关论文
共 50 条
  • [1] Public-Key Cryptosystems Resilient to Key Leakage
    Naor, Moni
    Segev, Gil
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2009, 2009, 5677 : 18 - 35
  • [2] Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions
    Fujisaki, Eiichiro
    Xagawa, Keita
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2016, PT I, 2016, 10031 : 908 - 938
  • [3] Coalition public-key cryptosystems
    Anisimov A.V.
    [J]. Cybernetics and Systems Analysis, 2001, 37 (1) : 1 - 12
  • [4] A survey of public-key cryptosystems
    Koblitz, N
    Menezes, AJ
    [J]. SIAM REVIEW, 2004, 46 (04) : 599 - 634
  • [5] Quantum public-key cryptosystems
    Okamoto, T
    Tanaka, K
    Uchiyama, S
    [J]. ADVANCES IN CRYPTOLOGY-CRYPTO 2000, PROCEEDINGS, 2000, 1880 : 147 - 165
  • [6] EVALUATION OF PUBLIC-KEY CRYPTOSYSTEMS
    DAVIES, DW
    PRICE, WL
    PARKIN, GI
    [J]. INFORMATION PRIVACY, 1980, 2 (04): : 138 - 154
  • [7] Key Distribution for Heterogeneous Public-Key Cryptosystems
    Lv, Xixiang
    Mu, Yi
    Li, Hui
    [J]. JOURNAL OF COMMUNICATIONS AND NETWORKS, 2013, 15 (05) : 464 - 468
  • [8] ATTACKING RSA PUBLIC-KEY CRYPTOSYSTEMS
    HAWKER, P
    [J]. ELECTRONICS WORLD & WIRELESS WORLD, 1990, 96 (1655): : 826 - 827
  • [9] THE USE OF FRACTIONS IN PUBLIC-KEY CRYPTOSYSTEMS
    ISSELHORST, H
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1990, 434 : 47 - 55
  • [10] Efficient and secure public-key cryptosystems
    Takagi, T
    [J]. CONTEMPORARY CRYPTOLOGY, 2005, : 191 - 237