首页 > 最新文献

Int. J. Appl. Cryptogr.最新文献

英文 中文
Power analysis attack: an approach based on machine learning 功率分析攻击:一种基于机器学习的方法
Pub Date : 2014-06-01 DOI: 10.1504/IJACT.2014.062722
Liran Lerman, Gianluca Bontempi, O. Markowitch
In cryptography, a side-channel attack is any attack based on the analysis of measurements related to the physical implementation of a cryptosystem. Nowadays, the possibility of collecting a large amount of observations paves the way to the adoption of machine learning techniques, i.e., techniques able to extract information and patterns from large datasets. The use of statistical techniques for side-channel attacks is not new. Techniques like the template attack have shown their effectiveness in recent years. However, these techniques rely on parametric assumptions and are often limited to small dimensionality settings, which limit their range of application. This paper explores the use of machine learning techniques to relax such assumptions and to deal with high dimensional feature vectors.
在密码学中,侧信道攻击是基于与密码系统的物理实现相关的测量分析的任何攻击。如今,收集大量观测数据的可能性为采用机器学习技术铺平了道路,即能够从大型数据集中提取信息和模式的技术。在侧信道攻击中使用统计技术并不是什么新鲜事。近年来,模板攻击等技术已经显示出了它们的有效性。然而,这些技术依赖于参数假设,并且通常局限于小维度设置,这限制了它们的应用范围。本文探讨了使用机器学习技术来放松这些假设并处理高维特征向量。
{"title":"Power analysis attack: an approach based on machine learning","authors":"Liran Lerman, Gianluca Bontempi, O. Markowitch","doi":"10.1504/IJACT.2014.062722","DOIUrl":"https://doi.org/10.1504/IJACT.2014.062722","url":null,"abstract":"In cryptography, a side-channel attack is any attack based on the analysis of measurements related to the physical implementation of a cryptosystem. Nowadays, the possibility of collecting a large amount of observations paves the way to the adoption of machine learning techniques, i.e., techniques able to extract information and patterns from large datasets. The use of statistical techniques for side-channel attacks is not new. Techniques like the template attack have shown their effectiveness in recent years. However, these techniques rely on parametric assumptions and are often limited to small dimensionality settings, which limit their range of application. This paper explores the use of machine learning techniques to relax such assumptions and to deal with high dimensional feature vectors.","PeriodicalId":350332,"journal":{"name":"Int. J. Appl. Cryptogr.","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129733846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 117
Encrypted integer division and secure comparison 加密整数除法和安全比较
Pub Date : 2014-06-01 DOI: 10.1504/IJACT.2014.062738
T. Veugen
When processing data in the encrypted domain, homomorphic encryption can be used to enable linear operations on encrypted data. Integer division of encrypted data however requires an additional protocol between the client and the server and will be relatively expensive. We present new solutions for dividing encrypted data in the semi-honest model using homomorphic encryption and additive blinding, having low computational and communication complexity. In most of our protocols we assume the divisor is publicly known. The division result is not only computed exactly, but may also be approximated leading to further improved performance. The idea of approximating the result of an integer division is extended to similar results for secure comparison, secure minimum, and secure maximum in the client-server model, yielding new efficient protocols with demonstrated application in biometrics. The exact minimum protocol is shown to outperform existing approaches.
在处理加密域中的数据时,可以使用同态加密对加密数据进行线性操作。但是,加密数据的整数除法需要客户端和服务器之间的附加协议,并且成本相对较高。利用同态加密和加性盲的方法对半诚实模型中的加密数据进行分割,具有较低的计算复杂度和通信复杂度。在我们的大多数协议中,我们假设除数是公开的。除法结果不仅可以精确计算,而且可以近似计算,从而进一步提高性能。将近似整数除法结果的思想扩展到客户机-服务器模型中的安全比较、安全最小值和安全最大值的类似结果,从而产生新的高效协议,并在生物识别学中得到了演示应用。精确的最小协议被证明优于现有的方法。
{"title":"Encrypted integer division and secure comparison","authors":"T. Veugen","doi":"10.1504/IJACT.2014.062738","DOIUrl":"https://doi.org/10.1504/IJACT.2014.062738","url":null,"abstract":"When processing data in the encrypted domain, homomorphic encryption can be used to enable linear operations on encrypted data. Integer division of encrypted data however requires an additional protocol between the client and the server and will be relatively expensive. We present new solutions for dividing encrypted data in the semi-honest model using homomorphic encryption and additive blinding, having low computational and communication complexity. In most of our protocols we assume the divisor is publicly known. The division result is not only computed exactly, but may also be approximated leading to further improved performance. The idea of approximating the result of an integer division is extended to similar results for secure comparison, secure minimum, and secure maximum in the client-server model, yielding new efficient protocols with demonstrated application in biometrics. The exact minimum protocol is shown to outperform existing approaches.","PeriodicalId":350332,"journal":{"name":"Int. J. Appl. Cryptogr.","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126814404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 54
Random Forest profiling attack on advanced encryption standard 随机森林分析攻击高级加密标准
Pub Date : 2014-06-01 DOI: 10.1504/IJACT.2014.062740
Hiren J. Patel, R. Baldwin
Random Forest, a non-parametric classifier, is proposed for byte-wise profiling attack on advanced encryption standard AES and shown to improve results on PIC microcontrollers, especially in high-dimensional variable spaces. It is shown in this research that data collected from 40 PIC microcontrollers exhibited highly non-Gaussian variables. For the full-dimensional dataset consisting of 50,000 variables, Random Forest correctly extracted all 16 bytes of the AES key. For a reduced set of 2,700 variables captured during the first round of the encryption, Random Forest achieved success rates as high as 100% for cross-device attacks on 40 PIC microcontrollers from four different device families. With further dimensionality reduction, Random Forest still outperformed classical template attack for this dataset, requiring fewer traces and achieving higher success rates with lower misclassification rate. The importance of analysing the system noise in choosing a classifier for profiling attack is examined and demonstrated through this work.
随机森林,一种非参数分类器,被提出用于高级加密标准AES的逐字节分析攻击,并被证明可以改善PIC微控制器的结果,特别是在高维变量空间中。本研究表明,从40个PIC微控制器收集的数据显示出高度非高斯变量。对于包含50,000个变量的全维数据集,Random Forest正确提取了AES密钥的所有16个字节。对于在第一轮加密期间捕获的2700个变量的减少集,随机森林在来自四个不同设备系列的40个PIC微控制器的跨设备攻击中实现了高达100%的成功率。在进一步降维的情况下,对于该数据集,随机森林仍然优于经典模板攻击,需要更少的跟踪,获得更高的成功率和更低的误分类率。通过这项工作,研究和证明了分析系统噪声在选择分析攻击分类器中的重要性。
{"title":"Random Forest profiling attack on advanced encryption standard","authors":"Hiren J. Patel, R. Baldwin","doi":"10.1504/IJACT.2014.062740","DOIUrl":"https://doi.org/10.1504/IJACT.2014.062740","url":null,"abstract":"Random Forest, a non-parametric classifier, is proposed for byte-wise profiling attack on advanced encryption standard AES and shown to improve results on PIC microcontrollers, especially in high-dimensional variable spaces. It is shown in this research that data collected from 40 PIC microcontrollers exhibited highly non-Gaussian variables. For the full-dimensional dataset consisting of 50,000 variables, Random Forest correctly extracted all 16 bytes of the AES key. For a reduced set of 2,700 variables captured during the first round of the encryption, Random Forest achieved success rates as high as 100% for cross-device attacks on 40 PIC microcontrollers from four different device families. With further dimensionality reduction, Random Forest still outperformed classical template attack for this dataset, requiring fewer traces and achieving higher success rates with lower misclassification rate. The importance of analysing the system noise in choosing a classifier for profiling attack is examined and demonstrated through this work.","PeriodicalId":350332,"journal":{"name":"Int. J. Appl. Cryptogr.","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125512558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Dynamic attribute-based group signature with verifier-local revocation and backward unlinkability in the standard model 标准模型中具有验证者本地撤销和向后不可链接性的基于属性的动态组签名
Pub Date : 2014-06-01 DOI: 10.1504/IJACT.2014.062736
Syed Taqi Ali, B. B. Amberker
Attribute-based group signature ABGS scheme is a group signature scheme where the group members possessing certain privileges attributes only are eligible for signing the document. In verifier-local revocation VLR schemes, only verifiers are involved in the revocation of a member, while signers are not. Backward unlinkability ensures that even after a member is revoked, signatures produced by the member before the revocation remain anonymous. There is an ABGS scheme with VLR feature in the literature but it neither supports backward unlinkability nor has attribute anonymity nor it is in standard model and moreover its signature length is not constant. We propose a VLR ABGS scheme with all these features in the standard model.
基于属性的组签名ABGS方案是一种只有具有某些特权属性的组成员才有资格对文档进行签名的组签名方案。在验证者-本地撤销VLR方案中,只有验证者参与成员的撤销,而签名者不参与。向后不可链接性确保即使在撤销成员之后,该成员在撤销之前生成的签名仍然是匿名的。文献中已有一种具有VLR特征的ABGS方案,但该方案既不支持后向不可链接性,又不具有属性匿名性,且不符合标准模型,且签名长度不恒定。我们提出了一种具有标准模型中所有这些特征的VLR ABGS方案。
{"title":"Dynamic attribute-based group signature with verifier-local revocation and backward unlinkability in the standard model","authors":"Syed Taqi Ali, B. B. Amberker","doi":"10.1504/IJACT.2014.062736","DOIUrl":"https://doi.org/10.1504/IJACT.2014.062736","url":null,"abstract":"Attribute-based group signature ABGS scheme is a group signature scheme where the group members possessing certain privileges attributes only are eligible for signing the document. In verifier-local revocation VLR schemes, only verifiers are involved in the revocation of a member, while signers are not. Backward unlinkability ensures that even after a member is revoked, signatures produced by the member before the revocation remain anonymous. There is an ABGS scheme with VLR feature in the literature but it neither supports backward unlinkability nor has attribute anonymity nor it is in standard model and moreover its signature length is not constant. We propose a VLR ABGS scheme with all these features in the standard model.","PeriodicalId":350332,"journal":{"name":"Int. J. Appl. Cryptogr.","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114909931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Parallelisable variants of Camellia and SMS4 block cipher: p-Camellia and p-SMS4 茶花和SMS4块密码的平行变体:p-Camellia和p-SMS4
Pub Date : 2013-04-01 DOI: 10.1504/IJACT.2013.053432
Huihui Yap, Khoongming Khoo, A. Poschmann
We propose two parallelisable variants of Camellia and SMS4 block ciphers based on the n-cell GF-NLFSR. The n-cell generalised Feistel-non-linear feedback shift register GF-NLFSR structure Choy et al., 2009a is a generalised unbalanced Feistel network that can be considered as a generalisation of the outer function FO of the KASUMI block cipher. An advantage of this cipher over other n-cell generalised Feistel networks, e.g., SMS4 Diffe and Ledin, 2008 and Camellia Aokiet al., 2001, is that it is parallelisable for up to n rounds. In hardware implementations, the benefits translate to speeding up encryption by up to n times while consuming similar area and significantly less power. At the same time, n-cell GF-NLFSR structures offer similar proofs of security against differential cryptanalysis as conventional n-cell Feistel structures. In this paper, we prove security against differential, linear and boomerang attacks. We also show that the selected number of rounds are conservative enough to provide high security margin against other known attacks such as integral, impossible differential, higher order differential, interpolation, slide, XSL and related-key differential attacks.
我们提出了两种基于n细胞GF-NLFSR的Camellia和SMS4分组密码的并行变体。n单元广义费斯特尔-非线性反馈移位寄存器GF-NLFSR结构(Choy et al., 2009a)是一种广义非平衡费斯特尔网络,可以认为是KASUMI分组密码的外函数FO的推广。与其他n-cell广义Feistel网络(例如,SMS4 Diffe和Ledin, 2008和Camellia Aokiet al., 2001)相比,该密码的一个优点是它最多可并行n轮。在硬件实现中,其好处是将加密速度提高了n倍,同时消耗相似的面积和显着降低的功耗。同时,n-cell GF-NLFSR结构提供了与传统n-cell Feistel结构类似的针对差分密码分析的安全性证明。在本文中,我们证明了对微分攻击、线性攻击和回旋攻击的安全性。我们还表明,所选择的轮数足够保守,可以提供较高的安全余量,以抵御其他已知的攻击,如积分、不可能微分、高阶微分、插值、滑动、XSL和相关密钥微分攻击。
{"title":"Parallelisable variants of Camellia and SMS4 block cipher: p-Camellia and p-SMS4","authors":"Huihui Yap, Khoongming Khoo, A. Poschmann","doi":"10.1504/IJACT.2013.053432","DOIUrl":"https://doi.org/10.1504/IJACT.2013.053432","url":null,"abstract":"We propose two parallelisable variants of Camellia and SMS4 block ciphers based on the n-cell GF-NLFSR. The n-cell generalised Feistel-non-linear feedback shift register GF-NLFSR structure Choy et al., 2009a is a generalised unbalanced Feistel network that can be considered as a generalisation of the outer function FO of the KASUMI block cipher. An advantage of this cipher over other n-cell generalised Feistel networks, e.g., SMS4 Diffe and Ledin, 2008 and Camellia Aokiet al., 2001, is that it is parallelisable for up to n rounds. In hardware implementations, the benefits translate to speeding up encryption by up to n times while consuming similar area and significantly less power. At the same time, n-cell GF-NLFSR structures offer similar proofs of security against differential cryptanalysis as conventional n-cell Feistel structures. In this paper, we prove security against differential, linear and boomerang attacks. We also show that the selected number of rounds are conservative enough to provide high security margin against other known attacks such as integral, impossible differential, higher order differential, interpolation, slide, XSL and related-key differential attacks.","PeriodicalId":350332,"journal":{"name":"Int. J. Appl. Cryptogr.","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129779043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Practical hybrid (hierarchical) identity-based encryption schemes based on the decisional bilinear Diffie-Hellman assumption 基于决策双线性Diffie-Hellman假设的实用混合(分层)身份加密方案
Pub Date : 2013-04-01 DOI: 10.1504/IJACT.2013.053434
S. Chatterjee, P. Sarkar
The paper proposes a HIBE scheme, which improves upon Waters' scheme from Eurocrypt 2005 by significantly reducing the size of the public parameters. The improvement is based on two ideas: 1 partitioning the identities in smaller blocks; 2 reusing public parameters. Modification of the basic HIBE scheme yields a CCA-secure hybrid HIBE where symmetric key authentication is used to eliminate costly pairing operations from the decryption algorithm. The protocols and the security arguments are recast in the most efficient asymmetric pairing setting where one gets several variants of the basic protocol with associated trade-offs in the ciphertext overhead and public parameter size. For practical security levels, the variants we obtain are currently the most efficient and practical among all other schemes which achieve similar security under the DBDH assumption. The basic idea provides improvements to the construction of other cryptographic primitives such as signatures, wildcard IBE and certificateless encryption.
本文提出了一个HIBE方案,该方案通过显著减小公共参数的大小,改进了2005年Eurocrypt中Waters的方案。改进基于两个想法:1将标识划分为更小的块;2 .重用公共参数。对基本HIBE方案的修改产生了cca安全的混合HIBE,其中使用对称密钥身份验证来消除解密算法中代价高昂的配对操作。协议和安全参数在最有效的非对称配对设置中被重新定义,在这种设置中,人们可以获得基本协议的几个变体,并在密文开销和公共参数大小方面进行相关的权衡。对于实际安全级别,我们获得的变体是目前在DBDH假设下实现类似安全性的所有其他方案中最有效和最实用的。其基本思想改进了其他加密原语(如签名、通配符IBE和无证书加密)的构造。
{"title":"Practical hybrid (hierarchical) identity-based encryption schemes based on the decisional bilinear Diffie-Hellman assumption","authors":"S. Chatterjee, P. Sarkar","doi":"10.1504/IJACT.2013.053434","DOIUrl":"https://doi.org/10.1504/IJACT.2013.053434","url":null,"abstract":"The paper proposes a HIBE scheme, which improves upon Waters' scheme from Eurocrypt 2005 by significantly reducing the size of the public parameters. The improvement is based on two ideas: 1 partitioning the identities in smaller blocks; 2 reusing public parameters. Modification of the basic HIBE scheme yields a CCA-secure hybrid HIBE where symmetric key authentication is used to eliminate costly pairing operations from the decryption algorithm. The protocols and the security arguments are recast in the most efficient asymmetric pairing setting where one gets several variants of the basic protocol with associated trade-offs in the ciphertext overhead and public parameter size. For practical security levels, the variants we obtain are currently the most efficient and practical among all other schemes which achieve similar security under the DBDH assumption. The basic idea provides improvements to the construction of other cryptographic primitives such as signatures, wildcard IBE and certificateless encryption.","PeriodicalId":350332,"journal":{"name":"Int. J. Appl. Cryptogr.","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131350761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Secure computation of functionalities based on Hamming distance and its application to computing document similarity 基于汉明距离的功能安全计算及其在文档相似度计算中的应用
Pub Date : 2013-04-01 DOI: 10.1504/IJACT.2013.053433
Ayman Jarrous, Benny Pinkas
This paper examines secure two-party computation of functions, which depend only on the Hamming distance of the inputs of the two parties. We present efficient protocols for computing these functions. In particular, we present protocols which are secure in the sense of full simulatability against malicious adversaries. We then show applications of HDOT. These include protocols for checking similarity between documents without disclosing additional information about them these protocols are based on algorithms of Broder et al. for computing document similarity based on the Jaccard measure. Another application is a variant of symmetric private information retrieval SPIR, which can be used if the server's database contains N entries, at most N / logN of which have individual values, and the rest are set to some default value. The receiver does not learn whether it receives an individual value or the default value. This variant of PIR is unique since it can be based on the existence of OT alone.
本文研究了仅依赖于两方输入的汉明距离的函数的安全两方计算。我们提出了计算这些函数的有效协议。特别是,我们提出的协议在完全可模拟的意义上对恶意对手是安全的。然后我们展示了HDOT的应用。这些协议包括用于检查文档之间的相似性而不披露关于它们的额外信息的协议,这些协议基于Broder等人基于Jaccard度量计算文档相似性的算法。另一个应用程序是对称私有信息检索SPIR的变体,如果服务器的数据库包含N个条目,其中最多N / logN个条目具有单独的值,其余条目设置为默认值,则可以使用该应用程序。接收方不知道它接收到的是单个值还是默认值。这种PIR的变体是独特的,因为它可以仅基于OT的存在。
{"title":"Secure computation of functionalities based on Hamming distance and its application to computing document similarity","authors":"Ayman Jarrous, Benny Pinkas","doi":"10.1504/IJACT.2013.053433","DOIUrl":"https://doi.org/10.1504/IJACT.2013.053433","url":null,"abstract":"This paper examines secure two-party computation of functions, which depend only on the Hamming distance of the inputs of the two parties. We present efficient protocols for computing these functions. In particular, we present protocols which are secure in the sense of full simulatability against malicious adversaries. We then show applications of HDOT. These include protocols for checking similarity between documents without disclosing additional information about them these protocols are based on algorithms of Broder et al. for computing document similarity based on the Jaccard measure. Another application is a variant of symmetric private information retrieval SPIR, which can be used if the server's database contains N entries, at most N / logN of which have individual values, and the rest are set to some default value. The receiver does not learn whether it receives an individual value or the default value. This variant of PIR is unique since it can be based on the existence of OT alone.","PeriodicalId":350332,"journal":{"name":"Int. J. Appl. Cryptogr.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122650249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Chosen-prefix collisions for MD5 and applications MD5和应用程序的选择前缀冲突
Pub Date : 2012-07-01 DOI: 10.1504/IJACT.2012.048084
M.M.J. Stevens, A. Lenstra, B. Weger
We present a novel, automated way to find differential paths for MD5. Its main application is in the construction of chosen-prefix collisions. We have shown how, at an approximate expected cost of 2
我们提出了一种新颖的、自动的方法来查找MD5的差分路径。它的主要应用是构造选择前缀的碰撞。我们已经展示了如何以大约2的期望成本
{"title":"Chosen-prefix collisions for MD5 and applications","authors":"M.M.J. Stevens, A. Lenstra, B. Weger","doi":"10.1504/IJACT.2012.048084","DOIUrl":"https://doi.org/10.1504/IJACT.2012.048084","url":null,"abstract":"We present a novel, automated way to find differential paths for MD5. Its main application is in the construction of chosen-prefix collisions. We have shown how, at an approximate expected cost of 2","PeriodicalId":350332,"journal":{"name":"Int. J. Appl. Cryptogr.","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131215871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 46
Public key encryption schemes supporting equality test with authorisation of different granularity 公钥加密方案支持不同粒度授权的相等性测试
Pub Date : 2012-07-01 DOI: 10.1504/IJACT.2012.048079
Qiang Tang
In this paper, we extend the work about public key encryption schemes supporting fine-grained authorisation (FG-PKEET), done by Tang (2011b). First of all, we correct some flaws in Tang (2011b) and discuss how to extend the proposed cryptosystem to support approximate equality test. Secondly, we present a comparison between FG-PKEET and other similar primitives including AoN-PKEET by Tang (2011a) and PKEET by Yang et al. (2010), and demonstrate their differences in complexity and achieved security. Thirdly, to mitigate the inherent offline message recovery attacks, we extend FG-PKEET to a two-proxy setting, where two proxies need to collaborate in order to perform an equality test. Finally, we propose a cryptosystem and prove its security in the two-proxy setting.
在本文中,我们扩展了支持细粒度授权(FG-PKEET)的公钥加密方案的工作,该工作由Tang (2011b)完成。首先,我们修正了Tang (2011b)中的一些缺陷,并讨论了如何扩展所提出的密码系统以支持近似等式检验。其次,我们将FG-PKEET与其他类似的原语进行了比较,包括Tang (2011a)的AoN-PKEET和Yang等人(2010)的PKEET,并展示了它们在复杂性和实现安全性方面的差异。第三,为了减轻固有的离线消息恢复攻击,我们将FG-PKEET扩展到双代理设置,其中两个代理需要协作以执行相等性测试。最后,我们提出了一个密码系统,并证明了它在双代理环境下的安全性。
{"title":"Public key encryption schemes supporting equality test with authorisation of different granularity","authors":"Qiang Tang","doi":"10.1504/IJACT.2012.048079","DOIUrl":"https://doi.org/10.1504/IJACT.2012.048079","url":null,"abstract":"In this paper, we extend the work about public key encryption schemes supporting fine-grained authorisation (FG-PKEET), done by Tang (2011b). First of all, we correct some flaws in Tang (2011b) and discuss how to extend the proposed cryptosystem to support approximate equality test. Secondly, we present a comparison between FG-PKEET and other similar primitives including AoN-PKEET by Tang (2011a) and PKEET by Yang et al. (2010), and demonstrate their differences in complexity and achieved security. Thirdly, to mitigate the inherent offline message recovery attacks, we extend FG-PKEET to a two-proxy setting, where two proxies need to collaborate in order to perform an equality test. Finally, we propose a cryptosystem and prove its security in the two-proxy setting.","PeriodicalId":350332,"journal":{"name":"Int. J. Appl. Cryptogr.","volume":"146 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116338882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 115
Randomness extraction in elliptic curves and secret key derivation at the end of Diffie-Hellman protocol 椭圆曲线的随机提取及Diffie-Hellman协议的密钥推导
Pub Date : 2012-07-01 DOI: 10.1504/IJACT.2012.048083
Abdoul Aziz Ciss, Djiby Sow
A deterministic extractor for an elliptic curve, that converts a uniformly random point on the curve to a random bit-string with a uniform distribution, is an important tool in cryptography. Such extractors can be used for example in key derivation functions, in key exchange protocols and to design cryptographically secure pseudorandom number generator. In this paper, we present a simple and efficient deterministic extractor for an elliptic curve E defined over a non prime finite field. Our extractor, for a given random point P on the curve, outputs the k-first coefficients of the abscissa of the point P. This extractor confirms the two conjectures stated by Farashahi and Pellikaan (2007) and Farashahi et al. (2008), related to the extraction of bits from coordinates of a point of an elliptic curve. As applications of our extractor, we show under the decisional Diffie-Hellman problem on an elliptic curve defined over a finite field of characteristic two, that the k-first or the k-last bits of the abscissa of a random point on the curve are indistinguishable from a random bit-string of the same length.
椭圆曲线的确定性提取器是密码学中的一个重要工具,它将曲线上的均匀随机点转换为均匀分布的随机位串。这样的提取器可用于例如密钥派生函数、密钥交换协议和设计加密安全的伪随机数生成器。本文给出了定义在非素数有限域上的椭圆曲线E的一个简单有效的确定性提取器。对于曲线上给定的随机点P,我们的提取器输出点P的横坐标的k-first系数。这个提取器证实了Farashahi和Pellikaan(2007)以及Farashahi等人(2008)提出的两个猜想,这些猜想与从椭圆曲线上一点的坐标中提取比特有关。作为该提取器的应用,我们证明了在特征为2的有限域上定义的椭圆曲线上的决定性Diffie-Hellman问题下,曲线上任意点的横坐标的第k位或最后k位与相同长度的随机位串是不可区分的。
{"title":"Randomness extraction in elliptic curves and secret key derivation at the end of Diffie-Hellman protocol","authors":"Abdoul Aziz Ciss, Djiby Sow","doi":"10.1504/IJACT.2012.048083","DOIUrl":"https://doi.org/10.1504/IJACT.2012.048083","url":null,"abstract":"A deterministic extractor for an elliptic curve, that converts a uniformly random point on the curve to a random bit-string with a uniform distribution, is an important tool in cryptography. Such extractors can be used for example in key derivation functions, in key exchange protocols and to design cryptographically secure pseudorandom number generator. In this paper, we present a simple and efficient deterministic extractor for an elliptic curve E defined over a non prime finite field. Our extractor, for a given random point P on the curve, outputs the k-first coefficients of the abscissa of the point P. This extractor confirms the two conjectures stated by Farashahi and Pellikaan (2007) and Farashahi et al. (2008), related to the extraction of bits from coordinates of a point of an elliptic curve. As applications of our extractor, we show under the decisional Diffie-Hellman problem on an elliptic curve defined over a finite field of characteristic two, that the k-first or the k-last bits of the abscissa of a random point on the curve are indistinguishable from a random bit-string of the same length.","PeriodicalId":350332,"journal":{"name":"Int. J. Appl. Cryptogr.","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123857180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
Int. J. Appl. Cryptogr.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1