Int. J. Appl. Cryptogr.最新文献

筛选
英文 中文
Dynamic MDS diffusion layers with efficient software implementation 动态MDS扩散层与高效的软件实现
Int. J. Appl. Cryptogr. Pub Date : 2020-05-04 DOI: 10.1504/ijact.2020.10029198
M. R. M. Shamsabad, S. M. Dehnavi
{"title":"Dynamic MDS diffusion layers with efficient software implementation","authors":"M. R. M. Shamsabad, S. M. Dehnavi","doi":"10.1504/ijact.2020.10029198","DOIUrl":"https://doi.org/10.1504/ijact.2020.10029198","url":null,"abstract":"Maximum distance separable (MDS) matrices play a crucial role in symmetric ciphers as diffusion layers. Dynamic diffusion layers for software applications are less considered up to now. Dynamic (randomised) components could make symmetric ciphers more resistant against statistical and algebraic attacks. In this paper, after some theoretical investigation we present a family of parametric n × n, binary matrices Aα, n = 4t, such that for 4t many α ∈ Fn2 the matrices Aα, A3α ⊕ I and A7α ⊕ I are non-singular. With the aid of the proposed family of matrices, some well-known diffusion layers including the cyclic AES-like matrices and some recursive MDS diffusion layers could be made dynamic, at little extra cost in software. Then, we provide new families of MDS matrices which could be used as dynamic diffusion layers, using the proposed family of matrices. The implementation cost of every member in the presented families of MDS diffusion layers (except one cyclic family) is equal to its inverse. The proposed diffusion layers have a suitable implementation cost on a variety of modern processors.","PeriodicalId":350332,"journal":{"name":"Int. J. Appl. Cryptogr.","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114735680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Computing the optimal ate pairing over elliptic curves with embedding degrees 54 and 48 at the 256-bit security level 在256位安全级别下,计算嵌入度为54和48的椭圆曲线上的最优ate配对
Int. J. Appl. Cryptogr. Pub Date : 2020-05-04 DOI: 10.1504/ijact.2020.10027563
Narcisse Bang Mbiang, Emmanuel Fouotsa, Diego F. Aranha
{"title":"Computing the optimal ate pairing over elliptic curves with embedding degrees 54 and 48 at the 256-bit security level","authors":"Narcisse Bang Mbiang, Emmanuel Fouotsa, Diego F. Aranha","doi":"10.1504/ijact.2020.10027563","DOIUrl":"https://doi.org/10.1504/ijact.2020.10027563","url":null,"abstract":"Due to recent advances in the computation of finite fields discrete logarithms, the Barreto-Lynn-Scott family of elliptic curves of embedding degree 48 became suitable for instantiating pairing-based cryptography at the 256-bit security level. Observing the uncertainty around determining the constants that govern the best approach for computing discrete logarithms, Scott and Guillevic consider pairing-friendly elliptic curves of embedding degree higher than 50, and discovered a new family of elliptic curves with embedding degree 54. This work aims at investigating the theoretical and practical cost of both the Miller algorithm and the final exponentiation in the computation of the optimal ate pairing on the two aforementioned curves. Both our theoretical results, based on the operation counts of base-field operations, and our experimental observations collected from a real implementation, confirm that BLS48 curves remain the faster curve in the computation of the optimal ate pairing at the 256-bit security level.","PeriodicalId":350332,"journal":{"name":"Int. J. Appl. Cryptogr.","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124463319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Delegation-based conversion from CPA to CCA-secure predicate encryption 基于委托的从CPA到cca安全谓词加密的转换
Int. J. Appl. Cryptogr. Pub Date : 2020-05-03 DOI: 10.1504/ijact.2020.10029197
M. Nandi, Tapas Pandit
{"title":"Delegation-based conversion from CPA to CCA-secure predicate encryption","authors":"M. Nandi, Tapas Pandit","doi":"10.1504/ijact.2020.10029197","DOIUrl":"https://doi.org/10.1504/ijact.2020.10029197","url":null,"abstract":"In 2011, Yamada et al. proposed CPA to CCA-secure conversions for attribute-based encryption (ABE) based on the properties, verifiability and delegation. Later, the verifiability-based conversion was generalised from ABE to predicate encryption (PE) by Yamada et al. (2012) and Nandi et al. (2017). We observe that for bilinear-pairing based PE schemes, the cost of CCA-decryption blows up to the double of the cost of CPA-decryption due to verifiability testing. Therefore, the conversion based on delegation is mostly acceptable whenever a delegation-based conversion is available for the primitive PE scheme. In this paper, we investigate a generic delegation-based conversion from CPA to CCA-secure predicate encryption schemes. Our conversion generalises the delegation-based conversion of Yamada et al. (2011) from ABE to PE. We show that our conversion captures many subclasses of PE, e.g., (hierarchical) inner-product encryption, (doubly-)spatial encryption and functional encryption for regular languages.","PeriodicalId":350332,"journal":{"name":"Int. J. Appl. Cryptogr.","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127313762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A new authenticated encryption technique for handling long ciphertexts in memory constrained devices 在内存受限设备中处理长密文的一种新的身份验证加密技术
Int. J. Appl. Cryptogr. Pub Date : 2017-09-04 DOI: 10.1504/IJACT.2017.10007291
Megha Agrawal, D. Chang, S. K. Sanadhya
{"title":"A new authenticated encryption technique for handling long ciphertexts in memory constrained devices","authors":"Megha Agrawal, D. Chang, S. K. Sanadhya","doi":"10.1504/IJACT.2017.10007291","DOIUrl":"https://doi.org/10.1504/IJACT.2017.10007291","url":null,"abstract":"In authenticated encryption schemes, there are two techniques for handling long ciphertexts while working within the constraints of a low buffer size: releasing unverified plaintext (RUP) or producing intermediate tags (PIT). In this paper, in addition to the two techniques, we propose another way to handle a long ciphertext with a low buffer size by storing and releasing only one (generally, or only few) intermediate state without releasing or storing any part of an unverified plaintext and without need of generating any intermediate tag. In this paper we explain this generalised technique using our new construction sp-AELM. sp-AELM is a sponge-based authenticated encryption scheme that provides support for limited memory devices. We also provide its security proof for privacy and authenticity in an ideal permutation model, using a code-based game playing framework. Furthermore, we also present two more variants of sp-AELM that serve the same purpose and are more efficient than sp-AELM. The ongoing CAESAR competition has nine submissions which are based on the sponge construction. We apply our generalised technique of storing single intermediate state to all these submissions, to determine their suitability with a crypto module having limited memory. Our findings show that only ASCON and one of the PRIMATE's modes (namely GIBBON) satisfy the limited memory constraint using this technique, while the remaining schemes (namely, Artemia, ICEPOLE, Ketje, Keyak, NORX, Π-cipher, STRIBOB and two of the PRIMATEs modes: APE and HANUMAN) are not suitable for this scenario directly.","PeriodicalId":350332,"journal":{"name":"Int. J. Appl. Cryptogr.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116304376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A new public remote integrity checking scheme with user and data privacy 一种新的具有用户和数据隐私的公共远程完整性检查方案
Int. J. Appl. Cryptogr. Pub Date : 2017-09-04 DOI: 10.1504/IJACT.2017.10007296
Yiteng Feng, Guomin Yang, Joseph K. Liu
{"title":"A new public remote integrity checking scheme with user and data privacy","authors":"Yiteng Feng, Guomin Yang, Joseph K. Liu","doi":"10.1504/IJACT.2017.10007296","DOIUrl":"https://doi.org/10.1504/IJACT.2017.10007296","url":null,"abstract":"With cloud storage, users can store their data files on a remote cloud server with a high quality on-demand cloud service and are able to share their data with other users. Since cloud servers usually are not regarded as fully trusted and the cloud data can be shared amongst users, the integrity checking of the remote files has become an important issue. A number of remote data integrity checking protocols have been proposed in the literature to allow public auditing of cloud data by a third party auditor (TPA). However, user privacy is not taken into account in most of the existing protocols. We believe that preserving the anonymity (i.e., identity privacy) of the data owner is also very important in many applications. In this paper, we propose a new remote integrity checking scheme which allows the cloud server to protect the identity information of the data owner against the TPA. We also define a formal security model to capture the requirement of user anonymity, and prove the anonymity of the proposed scheme. Moreover, we improve the existing security model for data privacy against the TPA, and show that an extended version of our protocol is secure under the strengthened security model.","PeriodicalId":350332,"journal":{"name":"Int. J. Appl. Cryptogr.","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132673561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Preventing fault attacks using fault randomisation with a case study on AES 利用故障随机化防止故障攻击,并以AES为例进行研究
Int. J. Appl. Cryptogr. Pub Date : 2017-09-04 DOI: 10.1504/IJACT.2017.10007295
S. Ghosh, Dhiman Saha, A. Sengupta, D. R. Chowdhury
{"title":"Preventing fault attacks using fault randomisation with a case study on AES","authors":"S. Ghosh, Dhiman Saha, A. Sengupta, D. R. Chowdhury","doi":"10.1504/IJACT.2017.10007295","DOIUrl":"https://doi.org/10.1504/IJACT.2017.10007295","url":null,"abstract":"Fault attacks are one of the most effective side-channel attacks on symmetric key ciphers. Over the years a variety of countermeasure techniques have been proposed to prevent this kind of attack. A...","PeriodicalId":350332,"journal":{"name":"Int. J. Appl. Cryptogr.","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114808834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
CCA-secure revocable identity-based encryption schemes with decryption key exposure resistance 具有抗解密密钥暴露的cca安全可撤销的基于身份的加密方案
Int. J. Appl. Cryptogr. Pub Date : 2017-09-04 DOI: 10.1504/IJACT.2017.10007294
Yuu Ishida, Junji Shikata, Yohei Watanabe
{"title":"CCA-secure revocable identity-based encryption schemes with decryption key exposure resistance","authors":"Yuu Ishida, Junji Shikata, Yohei Watanabe","doi":"10.1504/IJACT.2017.10007294","DOIUrl":"https://doi.org/10.1504/IJACT.2017.10007294","url":null,"abstract":"Key revocation functionality is important for identity-based encryption (IBE) to manage users dynamically. Revocable IBE (RIBE) realises such revocation functionality with scalability. In PKC 2013, Seo and Emura first considered decryption key exposure resistance (DKER) as a new realistic threat, and proposed the first RIBE scheme with DKER. Their RIBE scheme is adaptively secure against chosen plaintext attacks (CPA), and there is no concrete RIBE scheme adaptively secure against chosen ciphertext attacks (CCA) even without DKER so far. In this paper, we first propose three constructions of adaptively CCA-secure RIBE schemes with DKER. The first and second schemes are based on an existing transformation, which is called a BCHK transformation, that a CPA-secure hierarchical IBE scheme can be transformed into a CCA-secure scheme. The third scheme is constructed via the KEM/DEM framework. Specifically, we newly propose a revocable identity-based key encapsulation mechanism (RIB-KEM), and we show a generic construction of a CCA-secure RIBE scheme from the RIB-KEM and a data encapsulation mechanism (DEM). The third scheme is more efficient than the first and second ones in terms of the ciphertext size.","PeriodicalId":350332,"journal":{"name":"Int. J. Appl. Cryptogr.","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128508483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
IBE and function-private IBE under linear assumptions with shorter ciphertexts and private keys, and extensions 线性假设下的IBE和功能私有IBE,具有更短的密文和私钥,以及扩展
Int. J. Appl. Cryptogr. Pub Date : 2017-09-04 DOI: 10.1504/IJACT.2017.10007292
K. Kurosawa, L. T. Phong
{"title":"IBE and function-private IBE under linear assumptions with shorter ciphertexts and private keys, and extensions","authors":"K. Kurosawa, L. T. Phong","doi":"10.1504/IJACT.2017.10007292","DOIUrl":"https://doi.org/10.1504/IJACT.2017.10007292","url":null,"abstract":"Many identity-based encryption schemes under the k-LIN assumption contain 2k + 1 group elements in the ciphertext overhead and private keys. In this paper, we push the limit further by constructing an IBE scheme under the k-LIN assumption with 2k group elements in the ciphertext overhead and private keys. The schemes have variants with shorter public parameters under the k-SCasc assumption, which is a close assumption to k-LIN. Furthermore, via additional refinements, we also put efforts in reducing the public parameter size of our schemes, under either k-LIN or k-SCasc. While we mainly consider securities in the standard model for our schemes, we also show how to make relatively more efficient schemes secure in the random oracle model. Our technique additionally expands to the scheme of Boneh et al. (CRYPTO 2013) to yield more efficient function-private IBE under the 2-LIN (aka, DLIN) assumption. Overall, the shortened size in ciphertexts and private keys inherently leads to fewer exponentiations and pairings in encryption and decryption, and hence yields schemes with better computational efficiency.","PeriodicalId":350332,"journal":{"name":"Int. J. Appl. Cryptogr.","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124323460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sponge-based CCA2 secure asymmetric encryption for arbitrary length message (extended version) 针对任意长度消息的基于海绵的CCA2安全非对称加密(扩展版本)
Int. J. Appl. Cryptogr. Pub Date : 2017-09-04 DOI: 10.1504/IJACT.2017.10007290
Tarun Kumar Bansal, D. Chang, S. K. Sanadhya
{"title":"Sponge-based CCA2 secure asymmetric encryption for arbitrary length message (extended version)","authors":"Tarun Kumar Bansal, D. Chang, S. K. Sanadhya","doi":"10.1504/IJACT.2017.10007290","DOIUrl":"https://doi.org/10.1504/IJACT.2017.10007290","url":null,"abstract":"OAEP and other similar schemes, proven secure in random-oracle model, require one or more hash functions with an output size larger than those of the standard hash functions. In this paper, we show that by using the popular Sponge construction in the OAEP framework, we can eliminate the need for such a hash function. We provide a new scheme in the OAEP framework and call our scheme Sponge-based asymmetric encryption padding (SpAEP). The scheme SpAEP is based on two functions: Sponge and SpongeWrap, and requires only standard output sizes proposed and standardised for Sponge functions. Our scheme is CCA2 secure for any trapdoor one-way permutation in the ideal permutation model for arbitrary length messages. Our scheme utilises the versatile Sponge function to enhance the capability and efficiency of the OAEP framework. Prior to this work, the only scheme proven secure in the ideal permutation model was OAEP-3R. However this scheme is not efficient in practice as it utilises a full domain permutation which is hard to find and construct efficiently in practice. Therefore, the author of OAEP-3R provided another version of OAEP-3R but in random oracle model. Our scheme SpAEP utilises the ideal permutation model in a novel manner which makes SpAEP efficient and practical to construct a public key encryption. We also propose a key encapsulation mechanism for hybrid encryption using SpAEP with any trapdoor one-way permutation.","PeriodicalId":350332,"journal":{"name":"Int. J. Appl. Cryptogr.","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129473995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Prover-Efficient Commit-and-Prove Zero-Knowledge SNARKs 证明高效的提交-证明零知识陷阱
Int. J. Appl. Cryptogr. Pub Date : 2016-04-13 DOI: 10.1007/978-3-319-31517-1_10
H. Lipmaa
{"title":"Prover-Efficient Commit-and-Prove Zero-Knowledge SNARKs","authors":"H. Lipmaa","doi":"10.1007/978-3-319-31517-1_10","DOIUrl":"https://doi.org/10.1007/978-3-319-31517-1_10","url":null,"abstract":"","PeriodicalId":350332,"journal":{"name":"Int. J. Appl. Cryptogr.","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114041284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信