Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions

被引:16
|
作者
Fujisaki, Eiichiro [1 ]
Xagawa, Keita [1 ]
机构
[1] NTT Secure Platform Labs, 3-9-11 Midori Cho, Musashino, Tokyo 1808585, Japan
关键词
Public-key encryption; Digital signature; Continuous tampering attacks; Bounded or continuous memory leakage; CRYPTOGRAPHY; ENCRYPTION; PARADIGM;
D O I
10.1007/978-3-662-53887-6_33
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We present the first chosen-ciphertext secure public-key encryption schemes resilient to continuous tampering of arbitrary (efficiently computable) functions. Since it is impossible to realize such a scheme without a self-destruction or key-updating mechanism, our proposals allow for either of them. As in the previous works resilient to this type of tampering attacks, our schemes also tolerate bounded or continuous memory leakage attacks at the same time. Unlike the previous results, our schemes have efficient instantiations, without relying on zero-knowledge proofs. We also prove that there is no secure digital signature scheme resilient to arbitrary tampering functions against a stronger variant of continuous tampering attacks, even if it has a self-destruction mechanism.
引用
收藏
页码:908 / 938
页数:31
相关论文
共 50 条
  • [21] Public-key cryptosystems based on cubic curves
    Koyama, Kenji
    Kuwakado, Hidenori
    Tsuruoka, Yukio
    NTT R and D, 1995, 44 (10): : 91 - 98
  • [22] Secure evolutionary hardware for public-key cryptosystems
    Nedjah, N
    Mourelle, LM
    CEC2004: PROCEEDINGS OF THE 2004 CONGRESS ON EVOLUTIONARY COMPUTATION, VOLS 1 AND 2, 2004, : 2130 - 2137
  • [23] Elliptic curve public-key cryptosystems - An introduction
    De Win, E
    Preneel, B
    STATE OF THE ART IN APPLIED CRYPTOGRAPHY, 1998, 1528 : 131 - 141
  • [24] Secure evolvable hardware for public-key cryptosystems
    Nadia Nedjah
    Luiza de Macedo Mourelle
    New Generation Computing, 2005, 23 : 259 - 275
  • [25] Secure evolvable hardware for public-key cryptosystems
    Nedjah, N
    Mourelle, LD
    NEW GENERATION COMPUTING, 2005, 23 (03) : 259 - 275
  • [26] ON THE EQUIVALENCE OF MCELIECE AND NIEDERREITER PUBLIC-KEY CRYPTOSYSTEMS
    LI, YX
    DENG, RH
    WANG, XM
    IEEE TRANSACTIONS ON INFORMATION THEORY, 1994, 40 (01) : 271 - 273
  • [27] COMPLEXITY-MEASURES FOR PUBLIC-KEY CRYPTOSYSTEMS
    GROLLMANN, J
    SELMAN, AL
    SIAM JOURNAL ON COMPUTING, 1988, 17 (02) : 309 - 335
  • [28] Public-key encryption scheme with optimal continuous leakage resilience
    Zhou, Yanwei
    Xu, Ran
    Zhang, Wenzheng
    Xia, Zhe
    Yang, Bo
    Gu, Chunxiang
    Huang, Meijuan
    INFORMATION PROCESSING LETTERS, 2023, 180
  • [29] Overcoming the Hole in the Bucket: Public-Key Cryptography Resilient to Continual Memory Leakage
    Brakerski, Zvika
    Kalai, Yael Tauman
    Katz, Jonathan
    Vaikuntanathan, Vinod
    2010 IEEE 51ST ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, 2010, : 501 - 510
  • [30] Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
    Alwen, Joel
    Dodis, Yevgeniy
    Wichs, Daniel
    ADVANCES IN CRYPTOLOGY - CRYPTO 2009, 2009, 5677 : 36 - 54