Abstract | ||
---|---|---|
F-Related-Key Attacks (RKAs) allow an adversary to tamper the key k stored in a cryptographic device by specifying related-key deriving (RKD) functions f in F and subsequently learn the outcome of the device under related keys f (k). In this paper, we present RKA secure public-key encryption (PKE) and symmetric encryption (SE) schemes admitting a tight security reduction to the standard s-Linear assumption. The security loss depends only on the security parameter and is independent of the number of tampering queries made by the adversary. Our encryption schemes are resilient to RKAs w. r. t. the set of restricted affine functions F-raff, of which the set of linear functions. lin is a subset F-lin In particular, Our encryption schemes serve as the first ones possessing tight RKA security for a non-trivial RKD function class. under standard assumptions. Moreover, our encryption schemes enjoy tight super-strong RKA securities, which are the strongest ones among the existing RKA security notions. |
Year | DOI | Venue |
---|---|---|
2018 | 10.1093/comjnl/bxy074 | COMPUTER JOURNAL |
Keywords | Field | DocType |
related-key attack,tight security reduction,public-key encryption,symmetric encryption | Computer security,Computer science,Encryption,Distributed computing | Journal |
Volume | Issue | ISSN |
61 | 12 | 0010-4620 |
Citations | PageRank | References |
0 | 0.34 | 1 |
Authors | ||
4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Shuai Han | 1 | 7 | 10.28 |
Shengli Liu | 2 | 484 | 45.70 |
Lin Lyu | 3 | 3 | 2.77 |
Dawu Gu | 4 | 644 | 103.50 |