File Download
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1145/2714576.2714622
- Scopus: eid_2-s2.0-84942546616
Supplementary
-
Citations:
- Scopus: 0
- Appears in Collections:
Conference Paper: Related randomness attacks for public key crypto systems
Title | Related randomness attacks for public key crypto systems |
---|---|
Authors | |
Keywords | Related-key attack Related-randomness attack Public key encryption Identity-based encryption Signatures |
Issue Date | 2015 |
Publisher | ACM. |
Citation | The 10th ACM Symposium on Information, Computer and Communications Security (ASIA CCS 2015), Singapore, 14-17 April 2015. In ASIACCS 2015 - Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, 2015, p. 215-223 How to Cite? |
Abstract | We initiate the study of related randomness attack in the face of a number of practical attacks in public key cryptography, ranges from active attacks like fault-injection, to passive attacks like software (mis)implementation on choosing random numbers. Our new definitions cover the well-known related-key attacks (RKA) where secret keys are related, and a number of new attacks, namely, related encryption randomness attacks, related signing randomness attacks, and related public key attacks. We provide generic constructions for security against these attacks, which are efficiently built upon normal encryption and signature schemes, leveraging RKA-secure pseudorandom function and generator. |
Persistent Identifier | http://hdl.handle.net/10722/218931 |
ISBN |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Yuen, TH | - |
dc.contributor.author | Zhang, C | - |
dc.contributor.author | Chow, SSM | - |
dc.contributor.author | Yiu, SM | - |
dc.date.accessioned | 2015-09-18T07:01:25Z | - |
dc.date.available | 2015-09-18T07:01:25Z | - |
dc.date.issued | 2015 | - |
dc.identifier.citation | The 10th ACM Symposium on Information, Computer and Communications Security (ASIA CCS 2015), Singapore, 14-17 April 2015. In ASIACCS 2015 - Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, 2015, p. 215-223 | - |
dc.identifier.isbn | 978-1-4503-3245-3 | - |
dc.identifier.uri | http://hdl.handle.net/10722/218931 | - |
dc.description.abstract | We initiate the study of related randomness attack in the face of a number of practical attacks in public key cryptography, ranges from active attacks like fault-injection, to passive attacks like software (mis)implementation on choosing random numbers. Our new definitions cover the well-known related-key attacks (RKA) where secret keys are related, and a number of new attacks, namely, related encryption randomness attacks, related signing randomness attacks, and related public key attacks. We provide generic constructions for security against these attacks, which are efficiently built upon normal encryption and signature schemes, leveraging RKA-secure pseudorandom function and generator. | - |
dc.language | eng | - |
dc.publisher | ACM. | - |
dc.relation.ispartof | ASIACCS 2015 - Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security | - |
dc.subject | Related-key attack | - |
dc.subject | Related-randomness attack | - |
dc.subject | Public key encryption | - |
dc.subject | Identity-based encryption | - |
dc.subject | Signatures | - |
dc.title | Related randomness attacks for public key crypto systems | - |
dc.type | Conference_Paper | - |
dc.identifier.email | Yiu, SM: smyiu@cs.hku.hk | - |
dc.identifier.authority | Yiu, SM=rp00207 | - |
dc.description.nature | link_to_OA_fulltext | - |
dc.identifier.doi | 10.1145/2714576.2714622 | - |
dc.identifier.scopus | eid_2-s2.0-84942546616 | - |
dc.identifier.hkuros | 251334 | - |
dc.identifier.spage | 215 | - |
dc.identifier.epage | 223 | - |
dc.publisher.place | United States | - |
dc.customcontrol.immutable | sml 151022 | - |