Title
Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions.
Abstract
We present the first chosen-ciphertext secure public-key encryption schemes resilient to continuous tampering of arbitrary (efficiently computable) functions. Since it is impossible to realize such a scheme without a self-destruction or key-updating mechanism, our proposals allow for either of them. As in the previous works resilient to this type of tampering attacks, our schemes also tolerate bounded or continuous memory leakage attacks at the same time. Unlike the previous results, our schemes have efficient instantiations, without relying on zero-knowledge proofs. We also prove that there is no secure digital signature scheme resilient to arbitrary tampering functions against a stronger variant of continuous tampering attacks, even if it has a self-destruction mechanism.
Year
DOI
Venue
2016
10.1007/978-3-662-53887-6_33
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2016, PT I
Keywords
Field
DocType
Public-key encryption,Digital signature,Continuous tampering attacks,Bounded or continuous memory leakage
Leakage (electronics),Computer science,Public key cryptosystem,Theoretical computer science,Digital signature,Encryption,Mathematical proof,Memory leak,Public-key cryptography,Bounded function
Conference
Volume
ISSN
Citations 
10031
0302-9743
3
PageRank 
References 
Authors
0.37
25
2
Name
Order
Citations
PageRank
Eiichiro Fujisaki11526114.30
Keita Xagawa225820.51