Limits of a conjecture on a leakage-resilient cryptosystem - Inria - Institut national de recherche en sciences et technologies du numérique Accéder directement au contenu
Article Dans Une Revue Information Processing Letters Année : 2014

Limits of a conjecture on a leakage-resilient cryptosystem

Résumé

Recently it was conjectured that an ElGamal-based public-key encryption scheme with stateful decryption resists lunch-time chosen ciphertext and leakage attacks in the only computation leaks information model. We give a non-trivial upper bound on the amount of leakage tolerated by this conjecture. More precisely, we prove that the conjecture does not hold if more than a View the MathML source fraction of the bits are leaked at every decryption step, by showing a lunch-time attack that recovers the full secret key. The attack uses a new variant of the Hidden Number Problem, that we call Hidden Shares - Hidden Number Problem, which is of independent interest.

Dates et versions

hal-00933429 , version 1 (20-01-2014)

Identifiants

Citer

David Galindo, Srinivas Vivek. Limits of a conjecture on a leakage-resilient cryptosystem. Information Processing Letters, 2014, 114 (4), pp.192-196. ⟨10.1016/j.ipl.2013.11.014⟩. ⟨hal-00933429⟩
178 Consultations
0 Téléchargements

Altmetric

Partager

Gmail Facebook X LinkedIn More