Code-Based Public-Key Encryption Resistant to Key Leakage - Security Engineering and Intelligence Informatics
Conference Papers Year : 2013

Code-Based Public-Key Encryption Resistant to Key Leakage

Edoardo Persichetti

Abstract

Side-channel attacks are a major issue for implementation of secure cryptographic schemes. Among these, key-leakage attacks describe a scenario in which an adversary is allowed to learn arbitrary information about the private key, the only constraint being the number of bits learned. In this work, we study key-leakage resilience according to the model presented by Akavia, Goldwasser and Vaikuntanathan at TCC ’09. As our main contribution, we present a code-based hash proof system; we obtain our construction by relaxing some of the requirements from the original definition of Cramer and Shoup. We then propose a leakage-resilient public-key encryption scheme that makes use of this hash proof system. To do so, we adapt a framework featured in a previous work by Alwen et al. regarding identity-based encryption (EUROCRYPT ’10). Our construction features error-correcting codes as a technical tool, and, as opposed to previous work, does not require the use of a randomness extractor.
Fichier principal
Vignette du fichier
978-3-642-40588-4_4_Chapter.pdf (353.63 Ko) Télécharger le fichier
Origin Files produced by the author(s)
Loading...

Dates and versions

hal-01506563 , version 1 (12-04-2017)

Licence

Identifiers

  • HAL Id : hal-01506563 , version 1

Cite

Edoardo Persichetti. Code-Based Public-Key Encryption Resistant to Key Leakage. 1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.44-54. ⟨hal-01506563⟩
50 View
129 Download

Share

More