Search
Search Results
-
Forward Security Under Leakage Resilience, Revisited
As both notions employ the same key-evolution paradigm, Bellare et al. (CANS 2017) study combining forward security with leakage resilience. The idea... -
-
More Efficient Public-Key Cryptography with Leakage and Tamper Resilience
In this paper, we study the design of efficient signature and public-key encryption (PKE) schemes in the presence of both leakage and tampering... -
(Full) Leakage resilience of Fiat-Shamir signatures over lattices
Fiat-Shamir is a mainstream construction paradigm of lattice-based signature schemes. While its theoretical security is well-studied, its...
-
New Bounds on the Local Leakage Resilience of Shamir’s Secret Sharing Scheme
We study the local leakage resilience of Shamir’s secret sharing scheme. In Shamir’s scheme, a random polynomial f of degree t is sampled over a... -
Leakage-Tolerant Circuits
A leakage-resilient circuit for \(f:\{0,1\}^n\rightarrow \{0,1\}^m\)... -
Deniable Cryptosystems: Simpler Constructions and Achieving Leakage Resilience
Deniable encryption (Canetti et al. in CRYPTO ’97) is an intriguing primitive, which provides security guarantee against coercion by allowing a... -
Leakage-resilient identity-based cryptography from minimal assumptions
Identity-based hash proof system (IB-HPS), a variant of hash proof system (HPS) in the identity-based setting, is a useful building block in...
-
Stronger Lower Bounds for Leakage-Resilient Secret Sharing
Threshold secret sharing allows a dealer to split a secret s into n shares, such that any t shares allow for reconstructing s, but no... -
Lightweight Leakage-Resilient PRNG from TBCs Using Superposition
In this paper, we propose a leakage-resilient pseudo-random number generator (PRNG) design that leverages the rekeying techniques of the PSV-Enc... -
Leakage-resilient Linear Secret-sharing Against Arbitrary Bounded-size Leakage Family
Motivated by leakage-resilient secure computation of circuits with addition and multiplication gates, this work studies the leakage-resilience of... -
Combined Fault and Leakage Resilience: Composability, Constructions and Compiler
Real-world cryptographic implementations nowadays are not only attacked via classical cryptanalysis but also via implementation attacks, including... -
Leakage-Resilient Attribute-Based Encryption with Attribute-Hiding
In this work, we present two generic frameworks for leakage-resilient attribute-based encryption (ABE), which is an improved version of ABE that can... -
On the Local Leakage Resilience of Linear Secret Sharing Schemes
We consider the following basic question: to what extent are standard secret sharing schemes and protocols for secure multiparty computation that...
-
Tracing the evolution of cyber resilience: a historical and conceptual review
In 2000, during a time when cyber security research was focused on the risks and threats posed by digital systems, the notion of being able to...
-
Leakage Sources of the ICLooPUF: Analysis of a Side-Channel Protected Oscillator-Based PUF
In the last years, Physical Unclonable Functions (PUFs) became a popular security primitive, which is nowadays also used in several products. As a... -
Leakage-Resilient \(\mathsf {IBE}\) / \(\mathsf {ABE}\) with Optimal Leakage Rates from Lattices
We derive the first adaptively secure \(\mathsf {IBE}\)... -
Connecting Leakage-Resilient Secret Sharing to Practice: Scaling Trends and Physical Dependencies of Prime Field Masking
Symmetric ciphers operating in (small or mid-size) prime fields have been shown to be promising candidates to maintain security against low-noise (or... -
Learn from Your Faults: Leakage Assessment in Fault Attacks Using Deep Learning
Generic vulnerability assessment of cipher implementations against Fault Attacks (FA) is a largely unexplored research area. Security assessment...
-
ZK-PCPs from Leakage-Resilient Secret Sharing
Zero-Knowledge PCPs (ZK-PCPs; Kilian, Petrank, and Tardos, STOC ‘97) are PCPs with the additional zero-knowledge guarantee that the view of any...