Matches in SemOpenAlex for { <https://semopenalex.org/work/W4301897447> ?p ?o ?g. }
Showing items 1 to 93 of
93
with 100 items per page.
- W4301897447 endingPage "574" @default.
- W4301897447 startingPage "547" @default.
- W4301897447 abstract "Since their introduction in the late 90’s, side-channel attacks have been considered as a major threat against cryptographic implementations. This threat has raised the need for formal leakage models in which the security of implementations can be proved. At Eurocrypt 2013, Prouff and Rivain introduced the noisy leakage model which has been argued to soundly capture the physical reality of power and electromagnetic leakages. In their work, they also provide the first formal security proof for a masking scheme in the noisy leakage model. However their work has two important limitations: (i) the security proof relies on the existence of a leak-free component, (ii) the tolerated amount of information in the leakage (aka leakage rate) is of O(1 / n) where n is the security parameter (i.e. the number of shares in the underlying masking scheme). The first limitation was nicely tackled by Duc, Dziembowski and Faust one year later (Eurocrypt 2014). Their main contribution was to show a security reduction from the noisy leakage model to the conceptually simpler random-probing model. They were then able to prove the security of the well-known Ishai-Sahai-Wagner scheme (Crypto 2003) in the noisy leakage model. The second limitation was addressed in a paper by Andrychowicz, Dziembowski and Faust (Eurocrypt 2016) which makes use of a construction due to Ajtai (STOC 2011) to achieve security in the strong adaptive probing model with a leakage rate of $$O(1/log n)$$ . The authors argue that their result can be translated into the noisy leakage model with a leakage rate of O(1) by using secret sharing based on algebraic geometric codes. In terms of complexity, the protected program scales from |P| arithmetic instructions to $$tilde{O}(|P| , n^2)$$ . According to the authors, this $$tilde{O}(n^2)$$ blow-up could be reduced to $$tilde{O}(n)$$ using packed secret sharing but no details are provided. Moreover, such an improvement would only be possible for a program of width at least linear in n. The issue of designing an explicit scheme achieving $$tilde{O}(n)$$ complexity blow-up for any arithmetic program is hence left open. In this paper, we tackle the above issue: we show how to securely compute in the presence of noisy leakage with a leakage rate $$tilde{O}(1)$$ and complexity blow-up $$tilde{O}(n)$$ . Namely, we introduce a transform that turns any program P composed of arithmetic instructions on some filed $$mathbb {F}$$ into a (functionally equivalent) program $$varPi $$ composed of $$|varPi | = O(|P| n log n)$$ arithmetic instructions which can tolerate some (quasi-constant) amount of noisy leakage on its internal variables (while revealing negligible information). We use a polynomial encoding allowing quasilinear multiplication based on the fast Number Theoretic Transform (NTT). We first show that our scheme is secure in the random-probing model with leakage rate $$O(1/log n)$$ . Using the reduction by Duc et al. this result can be translated in the noisy leakage model with a $$O(1/|mathbb {F}|^2 log n)$$ leakage rate. However, a straight application of this reduction is not satisfactory since our construction requires $$|mathbb {F}| = O(n)$$ . In order to bypass this issue (which is shared with the construction of Andrychowicz et al.), we provide a generic security reduction from the noisy leakage model at the logical-instruction level to the random-probing model at the arithmetic level. This reduction allows us to prove the security of our construction in the noisy leakage model with leakage rate $$tilde{O}(1)$$ ." @default.
- W4301897447 created "2022-10-06" @default.
- W4301897447 creator A5016292687 @default.
- W4301897447 creator A5025818320 @default.
- W4301897447 creator A5075769848 @default.
- W4301897447 date "2018-01-01" @default.
- W4301897447 modified "2023-09-30" @default.
- W4301897447 title "How to Securely Compute with Noisy Leakage in Quasilinear Complexity" @default.
- W4301897447 cites W1425736675 @default.
- W4301897447 cites W1511843316 @default.
- W4301897447 cites W1541150254 @default.
- W4301897447 cites W1574373886 @default.
- W4301897447 cites W1574535057 @default.
- W4301897447 cites W1592625985 @default.
- W4301897447 cites W1613874182 @default.
- W4301897447 cites W1897761346 @default.
- W4301897447 cites W191000419 @default.
- W4301897447 cites W1980557401 @default.
- W4301897447 cites W2042587503 @default.
- W4301897447 cites W2100605909 @default.
- W4301897447 cites W2133701468 @default.
- W4301897447 cites W2154909745 @default.
- W4301897447 cites W2161740631 @default.
- W4301897447 cites W2187461352 @default.
- W4301897447 cites W236432643 @default.
- W4301897447 cites W2418954816 @default.
- W4301897447 cites W2479727864 @default.
- W4301897447 cites W2496749353 @default.
- W4301897447 cites W2740740730 @default.
- W4301897447 cites W316831625 @default.
- W4301897447 doi "https://doi.org/10.1007/978-3-030-03329-3_19" @default.
- W4301897447 hasPublicationYear "2018" @default.
- W4301897447 type Work @default.
- W4301897447 citedByCount "4" @default.
- W4301897447 countsByYear W43018974472019 @default.
- W4301897447 countsByYear W43018974472021 @default.
- W4301897447 countsByYear W43018974472023 @default.
- W4301897447 crossrefType "book-chapter" @default.
- W4301897447 hasAuthorship W4301897447A5016292687 @default.
- W4301897447 hasAuthorship W4301897447A5025818320 @default.
- W4301897447 hasAuthorship W4301897447A5075769848 @default.
- W4301897447 hasBestOaLocation W43018974471 @default.
- W4301897447 hasConcept C11413529 @default.
- W4301897447 hasConcept C139719470 @default.
- W4301897447 hasConcept C142362112 @default.
- W4301897447 hasConcept C147343967 @default.
- W4301897447 hasConcept C153349607 @default.
- W4301897447 hasConcept C162324750 @default.
- W4301897447 hasConcept C178489894 @default.
- W4301897447 hasConcept C199360897 @default.
- W4301897447 hasConcept C26713055 @default.
- W4301897447 hasConcept C2776711565 @default.
- W4301897447 hasConcept C2777042071 @default.
- W4301897447 hasConcept C2777402240 @default.
- W4301897447 hasConcept C2779201187 @default.
- W4301897447 hasConcept C38652104 @default.
- W4301897447 hasConcept C41008148 @default.
- W4301897447 hasConcept C80444323 @default.
- W4301897447 hasConceptScore W4301897447C11413529 @default.
- W4301897447 hasConceptScore W4301897447C139719470 @default.
- W4301897447 hasConceptScore W4301897447C142362112 @default.
- W4301897447 hasConceptScore W4301897447C147343967 @default.
- W4301897447 hasConceptScore W4301897447C153349607 @default.
- W4301897447 hasConceptScore W4301897447C162324750 @default.
- W4301897447 hasConceptScore W4301897447C178489894 @default.
- W4301897447 hasConceptScore W4301897447C199360897 @default.
- W4301897447 hasConceptScore W4301897447C26713055 @default.
- W4301897447 hasConceptScore W4301897447C2776711565 @default.
- W4301897447 hasConceptScore W4301897447C2777042071 @default.
- W4301897447 hasConceptScore W4301897447C2777402240 @default.
- W4301897447 hasConceptScore W4301897447C2779201187 @default.
- W4301897447 hasConceptScore W4301897447C38652104 @default.
- W4301897447 hasConceptScore W4301897447C41008148 @default.
- W4301897447 hasConceptScore W4301897447C80444323 @default.
- W4301897447 hasLocation W43018974471 @default.
- W4301897447 hasLocation W43018974472 @default.
- W4301897447 hasOpenAccess W4301897447 @default.
- W4301897447 hasPrimaryLocation W43018974471 @default.
- W4301897447 hasRelatedWork W1541150254 @default.
- W4301897447 hasRelatedWork W1878339160 @default.
- W4301897447 hasRelatedWork W2055817294 @default.
- W4301897447 hasRelatedWork W2066997834 @default.
- W4301897447 hasRelatedWork W2080763148 @default.
- W4301897447 hasRelatedWork W2496749353 @default.
- W4301897447 hasRelatedWork W2611951339 @default.
- W4301897447 hasRelatedWork W4186701 @default.
- W4301897447 hasRelatedWork W4239903230 @default.
- W4301897447 hasRelatedWork W4282541326 @default.
- W4301897447 isParatext "false" @default.
- W4301897447 isRetracted "false" @default.
- W4301897447 workType "book-chapter" @default.