JAIST Repository >
b. 情報科学研究科・情報科学系 >
b11. 会議発表論文・発表資料等 >
b11-1. 会議発表論文・発表資料 >
このアイテムの引用には次の識別子を使用してください:
http://hdl.handle.net/10119/15123
|
タイトル: | Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions |
著者: | Fujisaki, Eiichiro Xagawa, Keita |
キーワード: | public key encryption digital signature continuous tampering attack memory leakage attack |
発行日: | 2016-11-09 |
出版者: | Springer |
誌名: | Lecture Notes in Computer Science |
巻: | 10031 |
開始ページ: | 908 |
終了ページ: | 938 |
DOI: | 10.1007/978-3-662-53887-6_33 |
抄録: | We present the first chosen-ciphertext secure public-key encryption schemes resilient to continuous tampering of arbitrary (efficiently computable) functions. Since it is impossible to realize such a scheme without a self-destruction or key-updating mechanism, our proposals allow for either of them. As in the previous works resilient to this type of tampering attacks, our schemes also tolerate bounded or continuous memory leakage attacks at the same time. Unlike the previous results, our schemes have efficient instantiations, without relying on zero-knowledge proofs. We also prove that there is no secure digital signature scheme resilient to arbitrary tampering functions against a stronger variant of continuous tampering attacks, even if it has a self-destruction mechanism. |
Rights: | ©IACR 2016. This article is the final version submitted by the author(s) to the IACR and to Springer-Verlag. The version published by Springer-Verlag is available at http://dx.doi.org/10.1007/978-3-662-53887-6_33. Eiichiro Fujisaki and Keita Xagawa, Lecture Notes in Computer Science, 10031, 2016, pp.908-938. |
URI: | http://hdl.handle.net/10119/15123 |
資料タイプ: | author |
出現コレクション: | b11-1. 会議発表論文・発表資料 (Conference Papers)
|
このアイテムのファイル:
ファイル |
記述 |
サイズ | 形式 |
23622.pdf | | 376Kb | Adobe PDF | 見る/開く |
|
当システムに保管されているアイテムはすべて著作権により保護されています。
|