Modeling leakage process of key information

被引:0
|
作者
Yang, Hao-Miao [1 ]
Gu, Xiao-Feng [1 ]
Li, Jian-Ping [1 ]
Sun, Shi-Xin [1 ]
机构
[1] Univ Elect Sci & Technol China, Coll Comp Sci & Engn, Chengdu 610054, Peoples R China
关键词
gradual key exposure; key update; key revocation; smooth entropy;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Proper key renewal interval may control the trade-off between security and renewal cost, and thus partial and gradual leakage of key information is studied for predicting quantitatively key life. A key is treated as a random vector. Smooth entropy represents still secret almost uniform random bits that can be extracted with high probability from a compromised key (as a result, smooth entropy may be used to define the key life). The varying of smooth entropy over time is modeled as a compound Poisson process.
引用
收藏
页码:979 / +
页数:2
相关论文
共 50 条
  • [1] Analysis of Information Leakage in Quantum Key Agreement
    刘胜利
    郑东
    陈克非
    Journal of Shanghai Jiaotong University(Science), 2006, (02) : 219 - 223
  • [2] Quantifying information leakage in process calculi
    Boreale, Michele
    INFORMATION AND COMPUTATION, 2009, 207 (06) : 699 - 725
  • [3] Quantifying information leakage in process calculi
    Boreale, Michele
    AUTOMATA, LANGUAGES AND PROGRAMMING, PT 2, 2006, 4052 : 119 - 131
  • [4] Study on sensitive information leakage vulnerability modeling
    Kim, Sung-Hwan
    Kim, Nam-Uk
    Chung, Tai-Myoung
    KYBERNETES, 2015, 44 (01) : 77 - 88
  • [5] Security Games with Information Leakage: Modeling and Computation
    Xu, Haifeng
    Jiang, Albert X.
    Sinha, Arunesh
    Rabinovich, Zinovi
    Dughmi, Shaddin
    Tambe, Milind
    PROCEEDINGS OF THE TWENTY-FOURTH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE (IJCAI), 2015, : 674 - 680
  • [6] Leakage Diffusion Modeling of Key Nodes of Gas Pipeline Network Based on Leakage Concentration
    Li, Hao-Peng
    Chen, Liang-Chao
    Dou, Zhan
    Min, Yi-Meng
    Wang, Qian-Lin
    Yang, Jian-Feng
    Zhang, Jian-Wen
    SUSTAINABILITY, 2024, 16 (01)
  • [7] Vulnerability-Information Leakage of Reused Secret Key in NewHope
    Terada, Routo
    Caceres Villena, Reynaldo
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2022, E105A (06) : 952 - 964
  • [8] INFORMATION AND POWER - INFORMATION AS A KEY IN POLITICAL-PROCESS
    DURR, WT
    PROCEEDINGS OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE, 1976, 13 : 76 - 76
  • [9] Modeling Leakage of Ephemeral Secrets in Tripartite/Group Key Exchange
    Manulis, Mark
    Suzuki, Koutarou
    Ustaoglu, Berkant
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2013, E96A (01) : 101 - 110
  • [10] Modeling Leakage of Ephemeral Secrets in Tripartite/Group Key Exchange
    Manulis, Mark
    Suzuki, Koutarou
    Ustaoglu, Berkant
    INFORMATION SECURITY AND CRYPTOLOGY - ISISC 2009, 2010, 5984 : 16 - +