메뉴 건너뛰기




Volumn , Issue , 2011, Pages 688-697

Storing secrets on continually leaky devices

Author keywords

[No Author keywords available]

Indexed keywords

CIPHERTEXTS; ENCRYPTION SCHEMES; EXTERNAL ATTACKER; GENERAL ACCESS STRUCTURE; INTERNAL STATE; LEAKAGE MODEL; MULTIPLE COMPONENTS; MULTIPLE DEVICES; PUBLIC-KEY ENCRYPTION; SECRET KEY; SECRET SHARING SCHEMES; SECRET VALUE; SHARING SCHEMES;

EID: 84863311631     PISSN: 02725428     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/FOCS.2011.35     Document Type: Conference Paper
Times cited : (62)

References (30)
  • 2
    • 70350627587 scopus 로고    scopus 로고
    • Simultaneous hardcore bits and cryptography against memory attacks
    • Sixth Theory of Cryptography Conference - TCC 2007, ser. O. Reingold, Ed., Springer-Verlag
    • A. Akavia, S. Goldwasser, and V. Vaikuntanathan, "Simultaneous hardcore bits and cryptography against memory attacks,"in Sixth Theory of Cryptography Conference - TCC 2007, ser. Lecture Notes in Computer Science, O. Reingold, Ed., vol. 5444. Springer-Verlag, 2009.
    • (2009) Lecture Notes in Computer Science , vol.5444
    • Akavia, A.1    Goldwasser, S.2    Vaikuntanathan, V.3
  • 3
    • 70350340328 scopus 로고    scopus 로고
    • Leakage-resilient public-key cryptography in the bounded-retrieval model
    • Advances in Cryptology - CRYPTO 2009, ser. S. Halevi, Ed., Springer-Verlag
    • J. Alwen, Y. Dodis, and D. Wichs, "Leakage-resilient public-key cryptography in the bounded-retrieval model," in Advances in Cryptology - CRYPTO 2009, ser. LNCS, S. Halevi, Ed., vol. 5677. Springer-Verlag, 2009, pp. 36-54.
    • (2009) LNCS , vol.5677 , pp. 36-54
    • Alwen, J.1    Dodis, Y.2    Wichs, D.3
  • 4
    • 78149275873 scopus 로고    scopus 로고
    • Survey: Leakage resilience and the bounded retrieval model
    • -, "Survey: Leakage resilience and the bounded retrieval model," in ICITS, 2009, pp. 1-18.
    • (2009) ICITS , pp. 1-18
    • Alwen, J.1    Dodis, Y.2    Wichs, D.3
  • 5
    • 35048887476 scopus 로고    scopus 로고
    • Short group signatures
    • D. Boneh, X. Boyen, and H. Shacham, "Short group signatures,"in CRYPTO, 2004, pp. 41-55.
    • (2004) CRYPTO , pp. 41-55
    • Boneh, D.1    Boyen, X.2    Shacham, H.3
  • 6
    • 78751478860 scopus 로고    scopus 로고
    • Overcomeing the hole in the bucket: Public-key cryptography against resilient to continual memory leakage
    • Las Vegas, NV, USA: IEEE, Oct. 23-26
    • Z. Brakerski, J. Katz, Y. Kalai, and V. Vaikuntanathan, "Overcomeing the hole in the bucket: Public-key cryptography against resilient to continual memory leakage," in FOCS. Las Vegas, NV, USA: IEEE, Oct. 23-26 2010, pp. 501-510.
    • (2010) FOCS , pp. 501-510
    • Brakerski, Z.1    Katz, J.2    Kalai, Y.3    Vaikuntanathan, V.4
  • 7
    • 77958056591 scopus 로고    scopus 로고
    • Leakage-resilient storage
    • SCN, ser. J. A. Garay and R. D. Prisco, Eds., Springer
    • F. Davì, S. Dziembowski, and D. Venturi, "Leakage-resilient storage," in SCN, ser. Lecture Notes in Computer Science, J. A. Garay and R. D. Prisco, Eds., vol. 6280. Springer, 2010, pp. 121-137.
    • (2010) Lecture Notes in Computer Science , vol.6280 , pp. 121-137
    • Davì, F.1    Dziembowski, S.2    Venturi, D.3
  • 8
    • 78751485079 scopus 로고    scopus 로고
    • Cryptography against continuous memory attacks
    • Las Vegas, NV, USA: IEEE, Oct. 23-26
    • Y. Dodis, K. Haralambiev, A. López-Alt, and D. Wichs, "Cryptography against continuous memory attacks," in FOCS. Las Vegas, NV, USA: IEEE, Oct. 23-26 2010, pp. 511-520.
    • (2010) FOCS , pp. 511-520
    • Dodis, Y.1    Haralambiev, K.2    López-Alt, A.3    Wichs, D.4
  • 11
    • 57949107348 scopus 로고    scopus 로고
    • Leakage-resilient cryptography
    • Philadelphia, PA, USA: IEEE Computer Society, Oct. 25-28
    • S. Dziembowski and K. Pietrzak, "Leakage-resilient cryptography,"in 49th Symposium on Foundations of Computer Science. Philadelphia, PA, USA: IEEE Computer Society, Oct. 25-28 2008, pp. 293-302.
    • (2008) 49th Symposium on Foundations of Computer Science , pp. 293-302
    • Dziembowski, S.1    Pietrzak, K.2
  • 12
    • 77949609866 scopus 로고    scopus 로고
    • ECRYPT, last accessed: August 26, 2009.
    • ECRYPT, "Side channel cryptanalysis lounge," last accessed: August 26, 2009. http://www.emsec.rub.de/research/projects/sclounge/.
    • Side Channel Cryptanalysis Lounge
  • 14
    • 77957009399 scopus 로고    scopus 로고
    • Securing computation against continuous leakage
    • CRYPTO, ser. T. Rabin, Ed., Springer
    • S. Goldwasser and G. N. Rothblum, "Securing computation against continuous leakage," in CRYPTO, ser. Lecture Notes in Computer Science, T. Rabin, Ed., vol. 6223. Springer, 2010, pp. 59-79.
    • (2010) Lecture Notes in Computer Science , vol.6223 , pp. 59-79
    • Goldwasser, S.1    Rothblum, G.N.2
  • 15
    • 0000966673 scopus 로고    scopus 로고
    • Advances in Cryptology - CRYPTO 2009
    • ser. Springer-Verlag
    • S. Halevi, Ed., Advances in Cryptology - CRYPTO 2009, ser. LNCS, vol. 5677. Springer-Verlag, 2009.
    • (2009) LNCS , vol.5677
    • Halevi, S.1
  • 16
    • 84957626176 scopus 로고
    • Proactive secret sharing or: How to cope with perpetual leakage
    • CRYPTO, ser. D. Coppersmith, Ed., Springer-Verlag, 27-31 Aug.
    • A. Herzberg, S. Jarecki, H. Krawczyk, and M. Yung, "Proactive secret sharing or: How to cope with perpetual leakage,"in CRYPTO, ser. LNCS, D. Coppersmith, Ed., vol. 963. Springer-Verlag, 27-31 Aug. 1995, pp. 339-352.
    • (1995) LNCS , vol.963 , pp. 339-352
    • Herzberg, A.1    Jarecki, S.2    Krawczyk, H.3    Yung, M.4
  • 17
    • 38049165151 scopus 로고    scopus 로고
    • Secure hybrid encryption from weakened key encapsulation
    • D. Hofheinz and E. Kiltz, "Secure hybrid encryption from weakened key encapsulation," in CRYPTO, 2007, pp. 553-571.
    • (2007) CRYPTO , pp. 553-571
    • Hofheinz, D.1    Kiltz, E.2
  • 19
    • 77957002505 scopus 로고    scopus 로고
    • Protecting cryptographic keys against continual leakage
    • CRYPTO, ser. T. Rabin, Ed., Springer
    • A. Juma and Y. Vahlis, "Protecting cryptographic keys against continual leakage," in CRYPTO, ser. Lecture Notes in Computer Science, T. Rabin, Ed., vol. 6223. Springer, 2010, pp. 41-58.
    • (2010) Lecture Notes in Computer Science , vol.6223 , pp. 41-58
    • Juma, A.1    Vahlis, Y.2
  • 20
    • 72449205531 scopus 로고    scopus 로고
    • Signature schemes with bounded leakage resilience
    • Advances in Cryptology - ASIACRYPT 2009, ser. M. Matsui, Ed. Springer- Verlag, to Appear
    • J. Katz and V. Vaikuntanathan, "Signature schemes with bounded leakage resilience," in Advances in Cryptology - ASIACRYPT 2009, ser. LNCS, M. Matsui, Ed. Springer- Verlag, 2009, to Appear.
    • (2009) LNCS
    • Katz, J.1    Vaikuntanathan, V.2
  • 21
    • 79959686827 scopus 로고    scopus 로고
    • How to leak on key updates
    • to Appear
    • A. B. Lewko, M. Lewko, and B. Waters, "How to leak on key updates," in STOC, 2011, to Appear.
    • (2011) STOC
    • Lewko, A.B.1    Lewko, M.2    Waters, B.3
  • 22
    • 79953164949 scopus 로고    scopus 로고
    • Achieving leakage resilience through dual system encryption
    • A. B. Lewko, Y. Rouselakis, and B. Waters, "Achieving leakage resilience through dual system encryption," in TCC, 2011, pp. 70-88.
    • (2011) TCC , pp. 70-88
    • Lewko, A.B.1    Rouselakis, Y.2    Waters, B.3
  • 23
    • 35048852134 scopus 로고    scopus 로고
    • Physically observable cryptography
    • (extended abstract)in First Theory of Cryptography Conference - TCC 2004, ser. M. Naor, Ed., Springer-Verlag, Feb. 19-21
    • S. Micali and L. Reyzin, "Physically observable cryptography (extended abstract)," in First Theory of Cryptography Conference - TCC 2004, ser. LNCS, M. Naor, Ed., vol. 2951. Springer-Verlag, Feb. 19-21 2004, pp. 278-296.
    • (2004) LNCS , vol.2951 , pp. 278-296
    • Micali, S.1    Reyzin, L.2
  • 24
    • 70350303869 scopus 로고    scopus 로고
    • Public-key cryptosystems resilient to key leakage
    • Advances in Cryptology - CRYPTO 2009, ser. S. Halevi, Ed., Springer-Verlag
    • M. Naor and G. Segev, "Public-key cryptosystems resilient to key leakage," in Advances in Cryptology - CRYPTO 2009, ser. LNCS, S. Halevi, Ed., vol. 5677. Springer-Verlag, 2009, pp. 18-35.
    • (2009) LNCS , vol.5677 , pp. 18-35
    • Naor, M.1    Segev, G.2
  • 25
    • 84871584138 scopus 로고    scopus 로고
    • Advances in Cryptology - CRYPTO 2010, 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings
    • ser. Springer
    • T. Rabin, Ed., Advances in Cryptology - CRYPTO 2010, 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings, ser. Lecture Notes in Computer Science, vol. 6223. Springer, 2010.
    • (2010) Lecture Notes in Computer Science , vol.6223
    • Rabin, T.1
  • 26
    • 78649291377 scopus 로고    scopus 로고
    • Reliable Computing Laboratory, Boston University, August 26
    • Reliable Computing Laboratory, Boston University, "Side channel attacks database," http://www.sidechannelattacks.com, last accessed: August 26, 2009.
    • (2009) Side Channel Attacks Database
  • 27
    • 33646718113 scopus 로고    scopus 로고
    • Authenticated id-based key exchange and remote log-in with simple token and pin number
    • M. Scott, "Authenticated id-based key exchange and remote log-in with simple token and pin number," Cryptology ePrint Archive, Report 2002/164, 2002, http://eprint.iacr.org/.
    • (2002) Cryptology ePrint Archive, Report 2002/164
    • Scott, M.1
  • 28
    • 38049124394 scopus 로고    scopus 로고
    • A cramer-shoup encryption scheme from the linear assumption and from progressively weaker linear variants
    • [Online]. Available
    • H. Shacham, "A cramer-shoup encryption scheme from the linear assumption and from progressively weaker linear variants," 2007, cryptology ePrint Archive, Report 2007/074. [Online]. Available: http://eprint.iacr.org/ 2007/074
    • (2007) Cryptology ePrint Archive, Report 2007/074
    • Shacham, H.1
  • 29
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir, "How to share a secret," Communications of the ACM, vol. 22, no. 11, pp. 612-613, 1979.
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 30
    • 23044474013 scopus 로고    scopus 로고
    • Evidence that xtr is more secure than supersingular elliptic curve cryptosystems
    • E. R. Verheul, "Evidence that xtr is more secure than supersingular elliptic curve cryptosystems," J. Cryptology, vol. 17, no. 4, pp. 277-296, 2004.
    • (2004) J. Cryptology , vol.17 , Issue.4 , pp. 277-296
    • Verheul, E.R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.