File Download
  Links for fulltext
     (May Require Subscription)
Supplementary

Conference Paper: Related randomness attacks for public key crypto systems

TitleRelated randomness attacks for public key crypto systems
Authors
KeywordsRelated-key attack
Related-randomness attack
Public key encryption
Identity-based encryption
Signatures
Issue Date2015
PublisherACM.
Citation
The 10th ACM Symposium on Information, Computer and Communications Security (ASIA CCS 2015), Singapore, 14-17 April 2015. In Conference Proceedings, 2015, p. 215-223 How to Cite?
AbstractWe initiate the study of related randomness attack in the face of a number of practical attacks in public key cryptography, ranges from active attacks like fault-injection, to passive attacks like software (mis)implementation on choosing random numbers. Our new definitions cover the well-known related-key attacks (RKA) where secret keys are related, and a number of new attacks, namely, related encryption randomness attacks, related signing randomness attacks, and related public key attacks. We provide generic constructions for security against these attacks, which are efficiently built upon normal encryption and signature schemes, leveraging RKA-secure pseudorandom function and generator.
Persistent Identifierhttp://hdl.handle.net/10722/218931
ISBN

 

DC FieldValueLanguage
dc.contributor.authorYuen, TH-
dc.contributor.authorZhang, C-
dc.contributor.authorChow, SSM-
dc.contributor.authorYiu, SM-
dc.date.accessioned2015-09-18T07:01:25Z-
dc.date.available2015-09-18T07:01:25Z-
dc.date.issued2015-
dc.identifier.citationThe 10th ACM Symposium on Information, Computer and Communications Security (ASIA CCS 2015), Singapore, 14-17 April 2015. In Conference Proceedings, 2015, p. 215-223-
dc.identifier.isbn978-1-4503-3245-3-
dc.identifier.urihttp://hdl.handle.net/10722/218931-
dc.description.abstractWe initiate the study of related randomness attack in the face of a number of practical attacks in public key cryptography, ranges from active attacks like fault-injection, to passive attacks like software (mis)implementation on choosing random numbers. Our new definitions cover the well-known related-key attacks (RKA) where secret keys are related, and a number of new attacks, namely, related encryption randomness attacks, related signing randomness attacks, and related public key attacks. We provide generic constructions for security against these attacks, which are efficiently built upon normal encryption and signature schemes, leveraging RKA-secure pseudorandom function and generator.-
dc.languageeng-
dc.publisherACM.-
dc.relation.ispartofASIA CCS '15: Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security-
dc.subjectRelated-key attack-
dc.subjectRelated-randomness attack-
dc.subjectPublic key encryption-
dc.subjectIdentity-based encryption-
dc.subjectSignatures-
dc.titleRelated randomness attacks for public key crypto systems-
dc.typeConference_Paper-
dc.identifier.emailYiu, SM: smyiu@cs.hku.hk-
dc.identifier.authorityYiu, SM=rp00207-
dc.description.naturelink_to_OA_fulltext-
dc.identifier.doi10.1145/2714576.2714622-
dc.identifier.hkuros251334-
dc.identifier.spage215-
dc.identifier.epage223-
dc.publisher.placeUnited States-
dc.customcontrol.immutablesml 151022-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats