期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Predicate encryption against master-key tampering attacks
1
作者 Yuejun Liu Rui Zhang Yongbin Zhou 《Cybersecurity》 CSCD 2019年第1期329-348,共20页
Many real world attacks often target the implementation of a cryptographic scheme,rather than the algorithm itself,and a system designer has to consider new models that can capture these attacks.For example,if the key... Many real world attacks often target the implementation of a cryptographic scheme,rather than the algorithm itself,and a system designer has to consider new models that can capture these attacks.For example,if the key can be tampered by physical attacks on the device,the security of the scheme becomes totally unclear.In this work,we investigate predicate encryption(PE),a powerful encryption primitive,in the setting of tampering attacks.First,we show that many existing frameworks to construct PE are vulnerable to tampering attacks.Then we present a new security notion to capture such attacks.Finally,we take Attrapadung’s framework in Eurocrypt’14 as an example to show how to"compile"these frameworks to tampering resilient ones.Moreover,our method is compatible with the original pair encoding schemes without introducing any redundancy. 展开更多
关键词 Tampering resilience Predicate encryption Pair encoding Dual system encryption
原文传递
Predicate encryption against master-key tampering attacks
2
作者 Yuejun Liu Rui Zhang Yongbin Zhou 《Cybersecurity》 2018年第1期632-651,共20页
Many real world attacks often target the implementation of a cryptographic scheme,rather than the algorithm itself,and a system designer has to consider new models that can capture these attacks.For example,if the key... Many real world attacks often target the implementation of a cryptographic scheme,rather than the algorithm itself,and a system designer has to consider new models that can capture these attacks.For example,if the key can be tampered by physical attacks on the device,the security of the scheme becomes totally unclear.In this work,we investigate predicate encryption(PE),a powerful encryption primitive,in the setting of tampering attacks.First,we show that many existing frameworks to construct PE are vulnerable to tampering attacks.Then we present a new security notion to capture such attacks.Finally,we take Attrapadung’s framework in Eurocrypt’14 as an example to show how to“compile"these frameworks to tampering resilient ones.Moreover,our method is compatible with the original pair encoding schemes without introducing any redundancy. 展开更多
关键词 Tampering resilience Predicate encryption Pair encoding Dual system encryption
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部