Projects per year
Authenticated encryption schemes in practice have to be robust against adversaries that have access to various types of leakage, for instance decryption leakage on invalid ciphertexts (protocol leakage), or leakage on the underlying primitives (side channel leakage). This work includes several novel contributions: we augment the notion of nonce-base authenticated encryption with the notion of continuous leakage and we prove composition results in the face of protocol and side channel leakage. Moreover, we show how to achieve authenticated encryption that is simultaneously both misuse resistant and leakage resilient, based on a sufficiently leakage resilient PRF, and finally we propose a concrete, pairing-based instantiation of the latter.
|Title of host publication||Advances in Cryptology - ASIACRYPT 2017|
|Subtitle of host publication||23rd International Conference on the Theory and Application of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part I|
|Number of pages||31|
|Publication status||Published - 30 Nov 2017|
|Name||Lecture Notes in Computer Science|
|Publisher||Springer Berlin Heidelberg|
- secret-key cryptography/provable security
- authenticated encryption
- generic composition
- leakage resilience
Oswald, M. E.
1/01/11 → 1/04/16