Paper 2013/677
Bounded Tamper Resilience: How to go beyond the Algebraic Barrier
Ivan Damgaard, Sebastian Faust, Pratyay Mukherjee, and Daniele Venturi
Abstract
Related key attacks (RKAs) are powerful cryptanalytic attacks where an adversary can change the secret key and observe the effect of such changes at the output. The state of the art in RKA security protects against an a-priori unbounded number of certain algebraic induced key relations, e.g., affine functions or polynomials of bounded degree. In this work, we show that it is possible to go beyond the algebraic barrier and achieve security against arbitrary key relations, by restricting the number of tampering queries the adversary is allowed to ask for. The latter restriction is necessary in case of arbitrary key relations, as otherwise a generic attack of Gennaro et al. (TCC 2004) shows how to recover the key of almost any cryptographic primitive. We describe our contributions in more detail below.
1) We show that standard ID and signature schemes constructed from a large class of
Note: Fixed minor inconsistencies. Bibliography updated.
Metadata
- Available format(s)
-
PDF
- Category
- Public-key cryptography
- Publication info
- A minor revision of an IACR publication in ASIACRYPT 2013
- Keywords
- related key securitybounded tamper resiliencepublic key encryptionidentification schemes
- Contact author(s)
- danone83 @ gmail com
- History
- 2015-02-18: last of 3 revisions
- 2013-10-24: received
- See all versions
- Short URL
- https://ia.cr/2013/677
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2013/677, author = {Ivan Damgaard and Sebastian Faust and Pratyay Mukherjee and Daniele Venturi}, title = {Bounded Tamper Resilience: How to go beyond the Algebraic Barrier}, howpublished = {Cryptology {ePrint} Archive, Paper 2013/677}, year = {2013}, url = {https://eprint.iacr.org/2013/677} }