|
For Full-Text PDF, please login, if you are a member of IEICE,
or go to Pay Per View on menu list, if you are a nonmember of IEICE.
|
Randomness Leakage in the KEM/DEM Framework
Hitoshi NAMIKI Keisuke TANAKA Kenji YASUNAGA
Publication
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Vol.E97-A
No.1
pp.191-199 Publication Date: 2014/01/01 Online ISSN: 1745-1337
DOI: 10.1587/transfun.E97.A.191 Print ISSN: 0916-8508 Type of Manuscript: Special Section PAPER (Special Section on Cryptography and Information Security) Category: Public Key Based Cryptography Keyword: leakage resilient cryptography, public-key encryption, KEM/DEM framework, hash proof system,
Full Text: PDF(739.8KB)>>
Summary:
Recently, there have been many studies on constructing cryptographic primitives that are secure even if some secret information leaks. In this paper, we consider the problem of constructing public-key encryption schemes that are resilient to leaking the randomness used in the encryption algorithm. In particular, we consider the case in which public-key encryption schemes are constructed from the KEM/DEM framework, and the leakage of randomness in the encryption algorithms of KEM and DEM occurs independently. For this purpose, we define a new security notion for KEM. Then we provide a generic construction of a public-key encryption scheme that is resilient to randomness leakage from any KEM scheme satisfying this security. Also we construct a KEM scheme that satisfies the security from hash proof systems.
|
|