Paper Search Console

Home Search Page About Contact

Journal Title

Title of Journal: J Supercomput

Search In Journal Title:

Abbravation: The Journal of Supercomputing

Search In Journal Abbravation:

Publisher

Springer US

Search In Publisher:

DOI

10.1007/bf01595909

Search In DOI:

ISSN

1573-0484

Search In ISSN:
Search In Title Of Papers:

RCB leakageresilient authenticated encryption vi

Authors: Megha Agrawal Tarun Kumar Bansal Donghoon Chang Amit Kumar Chauhan Seokhie Hong Jinkeon Kang Somitra Kumar Sanadhya
Publish Date: 2016/08/22
Volume: 74, Issue: 9, Pages: 4173-4198
PDF Link

Abstract

The security of modern cryptosystems relies on the secrecy of the keys Against the expectation that the keys used in cryptographic algorithms are perfectly secure the keys can get compromised when implemented on physical devices Because of the computational leakages from the execution of cryptographic algorithms a variety of sidechannel measurements can lead to full breaks of the targeted physical devices Leakageresilient cryptography aims at defining leakages in a generic model and designing provably secure primitives to capture sidechannel attacks For this purpose several rekeying schemes are proposed to prevent encryption scheme from using the same key many times In this paper we propose a leakageresilient authenticated encryption scheme called Rekeying Code Book RCB that is secure against the sidechannel attacks by combining with existing rekeying schemes Our approach is to find efficient composition by combining two independent primitives authenticated encryption and rekeying schemes rather than designing new algorithms We also give the precise definitions of privacy and authenticity for authenticated encryption in a leakageresilient model and then we provide the security proofs for RCB in a leakageresilient modelTo prove this lemma we use the hybrid argument This proof goes similar to the Lemma 33 given in 32 Let F be a function family from 0 1m to 0 1n and key length be k and let m ge 1 We also let Open image in new window and let Open image in new window We construct an algorithm mathcal C mathcal A given blackbox access to an adversary mathcal C with advantage mathsf Adv mFmathrm otlrprfmathcal C and algorithm mathcal C mathcal A defines an adversary mathcal A with advantage mathsf Adv fmathrm otlrprfmathcal A ge mathsf Adv mFmathrm otlrprfmathcal C/mAdversary mathcal C given oracle f first chooses an integer Open image in new window at random Next it chooses functions Open image in new window from F uniformly and independently It sets f i to its oracle function f with leakage function L It also chooses random functions f i+1 ldots f m from mathcal R It now runs adversary mathcal A with oracles f 1 ldots f m when the query is to jth oracle it answers via g j and invokes its oracle when j = i and otherwise uses its one of the chosen functions Adversary mathcal C outputs the same answer as whatever mathcal A outputsTo choose f 1 ldots f i1 from F meant to choose randomly i 1 keys K 1 ldots K i 1 Open image in new window and reply to jth query x for j i by f jx Furthermore mathcal A cannot choose random functions Therefore whenever mathcal B asks a jth query x for j i it chooses a random string of length k if x is not queried before add to the record list and returns it else if it is already chosen then answers taken from the record listLet mathsf AE = mathsf KG E D be an authenticated encryption scheme as defined in Sect 23 Our AE scheme is composed of two parts—the rekeying scheme g and the block cipher f For the nonadaptive granular leakageresilient model our AE scheme is split into time steps which leak independently The adversary mathcal A is allowed to choose a leakage function L = L 1 L 2 with components for each of these time steps L 1 for rekeying scheme and L 2 for the block cipher Then he submit q distinct queries to his oracle For each query he gets back either the real or random output of his query with leakage which is exactly the output of the leakage function L he chose We put a restriction on adversary mathcal A that he cannot make query to rekeying oracle without asking queries to encryption oracle We show that our scheme is leakageresilient secure We organize our security proof as a sequence of games 33 We start with game G 0 as a real game We make transitions in game G 0 to convert it into the random game G n for some n We say text PrG i as the winning event that the game G i outputs 1 for i = 0 1 2 ldots


Keywords:

References


.
Search In Abstract Of Papers:
Other Papers In This Journal:

  1. Fault-tolerant broadcast in anonymous systems
  2. A hyper-heuristic approach for resource provisioning-based scheduling in grid environment
  3. Constructing data supply chain based on layered PROV
  4. A localization algorithm for large scale mobile wireless sensor networks: a learning approach
  5. Comment on “A general model for long-tailed network traffic approximation”
  6. Direct private query in location-based services with GPU run time analysis
  7. A randomized clustering of anonymous wireless ad hoc networks with an application to the initialization problem
  8. GPU-based parallel genetic approach to large-scale travelling salesman problem
  9. SENFIS: a Sensor Node File System for increasing the scalability and reliability of Wireless Sensor Networks applications
  10. The panconnectivity and the pancycle-connectivity of the generalized base- b hypercube
  11. 3-Hierarchical resource management model on web grid service architecture
  12. Research challenges and perspectives on Wisdom Web of Things (W2T)
  13. A novel framework for social web forums’ thread ranking based on semantics and post quality features
  14. Conditional forwarding: simple flow control to increase adaptivity for fully adaptive routing algorithms
  15. A proposal on location data supplementing information transfer method over MANET
  16. A framework for SaaS software packages evaluation and selection with virtual team and BOCR of analytic network process
  17. Real-time blind audio source separation: performance assessment on an advanced digital signal processor
  18. High-efficient video compression for social multimedia distribution
  19. A framework for efficient performance prediction of distributed applications in heterogeneous systems
  20. Reducing the search space by closure and simplification paradigms
  21. P2P resource searching with Cloning Random Walker assisted by Weakly Connected Dominating Set
  22. Cost and energy aware service provisioning for mobile client in cloud computing environment
  23. PerContRep: a practical reputation system for pervasive content services
  24. Task scheduling for heterogeneous computing systems
  25. Integrating 3D image descriptors of margin sharpness and texture on a GPU-optimized similar pulmonary nodule retrieval engine
  26. Exploring the speedups of embedded microprocessor systems utilizing a high-performance coprocessor data-path
  27. Tuning remote GPU virtualization for InfiniBand networks
  28. Energy efficient utilization of resources in cloud computing systems
  29. The election problem in asynchronous distributed systems with bounded faulty processes
  30. Dynamic-width reconfigurable parallel prefix circuits
  31. Editorial: special issue on parallel nature-inspired optimization
  32. Combating I-O bottleneck using prefetching: model, algorithms, and ramifications
  33. Editorial of special section on advanced in high performance, algorithm, and framework for future computing
  34. Hierarchical multichannel-based integrated smart metering infrastructure
  35. A learning automata-based heuristic algorithm for solving the minimum spanning tree problem in stochastic graphs
  36. Distributed identification of the lineality space of a cone
  37. On studying business models in mobile social networks based on two-sided market (TSM)
  38. Reconfiguration process and routing management for service platforms
  39. Scheduling array redistribution with virtual channel support
  40. A case study of Grid Computing and computer algebra: parallel Gröbner Bases and Characteristic Sets
  41. A rhythm-based access control system for secure wellness services
  42. A novel Adaptive Cluster Transformation (ACT)-based intrusion tolerant architecture for hybrid information technology
  43. Panconnectivity of Cartesian product graphs
  44. Efficient search algorithms for RNAi target detection

Search Result: