RCB: leakage-resilient authenticated encryption via re-keying
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Agrawal, Megha | - |
dc.contributor.author | Bansal, Tarun Kumar | - |
dc.contributor.author | Chang, Donghoon | - |
dc.contributor.author | Chauhan, Amit Kumar | - |
dc.contributor.author | Hong, Seokhie | - |
dc.contributor.author | Kang, Jinkeon | - |
dc.contributor.author | Sanadhya, Somitra Kumar | - |
dc.date.accessioned | 2021-09-02T07:30:55Z | - |
dc.date.available | 2021-09-02T07:30:55Z | - |
dc.date.created | 2021-06-16 | - |
dc.date.issued | 2018-09 | - |
dc.identifier.issn | 0920-8542 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/73683 | - |
dc.description.abstract | The security of modern cryptosystems relies on the secrecy of the keys. Against the expectation that the keys used in cryptographic algorithms are perfectly secure, the keys can get compromised when implemented on physical devices. Because of the computational leakages from the execution of cryptographic algorithms, a variety of side-channel measurements can lead to full breaks of the targeted physical devices. Leakage-resilient cryptography aims at defining leakages in a generic model and designing provably secure primitives to capture side-channel attacks. For this purpose, several re-keying schemes are proposed to prevent encryption scheme from using the same key many times. In this paper, we propose a leakage-resilient authenticated encryption scheme, called Re-keying Code Book (RCB), that is secure against the side-channel attacks by combining with existing re-keying schemes. Our approach is to find efficient composition by combining two independent primitives, authenticated encryption, and re-keying schemes, rather than designing new algorithms. We also give the precise definitions of privacy and authenticity for authenticated encryption in a leakage-resilient model, and then, we provide the security proofs for RCB in a leakage-resilient model. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | SPRINGER | - |
dc.subject | SIDE-CHANNEL | - |
dc.subject | SECURITY | - |
dc.subject | MODE | - |
dc.title | RCB: leakage-resilient authenticated encryption via re-keying | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Hong, Seokhie | - |
dc.identifier.doi | 10.1007/s11227-016-1824-6 | - |
dc.identifier.scopusid | 2-s2.0-84983503451 | - |
dc.identifier.wosid | 000444739000002 | - |
dc.identifier.bibliographicCitation | JOURNAL OF SUPERCOMPUTING, v.74, no.9, pp.4173 - 4198 | - |
dc.relation.isPartOf | JOURNAL OF SUPERCOMPUTING | - |
dc.citation.title | JOURNAL OF SUPERCOMPUTING | - |
dc.citation.volume | 74 | - |
dc.citation.number | 9 | - |
dc.citation.startPage | 4173 | - |
dc.citation.endPage | 4198 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Engineering | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Hardware & Architecture | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Theory & Methods | - |
dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
dc.subject.keywordPlus | SIDE-CHANNEL | - |
dc.subject.keywordPlus | SECURITY | - |
dc.subject.keywordPlus | MODE | - |
dc.subject.keywordAuthor | Authenticated encryption | - |
dc.subject.keywordAuthor | Re-keying | - |
dc.subject.keywordAuthor | Side-channel attack | - |
dc.subject.keywordAuthor | Leakage-resilience | - |
dc.subject.keywordAuthor | Privacy | - |
dc.subject.keywordAuthor | Authenticity | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
145 Anam-ro, Seongbuk-gu, Seoul, 02841, Korea+82-2-3290-2963
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.