Secure Broadcasting of Two Encrypted Sources under Side-Channel Attacks

被引:0
|
作者
Santoso, Bagus [1 ]
Oohama, Yasutada [1 ]
机构
[1] Univ Electrocommun, Tokyo, Japan
关键词
D O I
10.1109/isit.2019.8849849
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We consider the secure communication problem of broadcasting of two encrypted sources against an adversary which launches side-channel attacks. The adversary is not only allowed to eavesdrop the ciphertexts in the public communication channel but is also allowed to obtain the side information on the secret keys via the side-channel. In this paper, we propose a theoretical framework to solve this problem and also propose a countermeasure based on the post-encryption-compression paradigm. We provide an explicit sufficient condition to attain the exponential decay of the information leakage as the block lengths of encrypted sources become large.
引用
收藏
页码:305 / 309
页数:5
相关论文
共 50 条
  • [21] Side-channel Attacks on Memristive Circuits Under External Disturbances
    Chen, Li-Wei
    Zhao, Xianyue
    Chen, Ziang
    Du, Nan
    Polian, Ilia
    2023 IEEE 32ND ASIAN TEST SYMPOSIUM, ATS, 2023, : 171 - 176
  • [22] Secure Data Deduplication with Resistance to Side-Channel Attacks via Fog Computing
    Zhang, Fuyou
    Qi, Saiyu
    Yuan, Haoran
    Zhang, Meng
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2019, PT II, 2020, 11945 : 440 - 455
  • [23] Energy Efficient Obfuscation of Side-Channel Leakage for Preventing Side-Channel Attacks
    Jin, Shan
    Xu, Minghua
    Cai, Yiwei
    39TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, SAC 2024, 2024, : 1405 - 1414
  • [24] DES with any reduced masked rounds is not secure against side-channel attacks
    Kim, Jongsung
    Lee, Yuseop
    Lee, Sangjin
    COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2010, 60 (02) : 347 - 354
  • [25] DRM to Counter Side-Channel Attacks?
    Benadjila, Ryad
    Billet, Olivier
    Francfort, Stanislas
    DRM'07: PROCEEDINGS OF THE 2007 ACM WORKSHOP ON DIGITAL RIGHTS MANAGEMENT, 2007, : 23 - 32
  • [26] Codes for Side-Channel Attacks and Protections
    Guilley, Sylvain
    Heuser, Annelie
    Rioul, Olivier
    CODES, CRYPTOLOGY AND INFORMATION SECURITY, C2SI 2017, 2017, 10194 : 35 - 55
  • [27] Side-Channel Attacks in a Real Scenario
    Ming Tang
    Maixing Luo
    Junfeng Zhou
    Zhen Yang
    Zhipeng Guo
    Fei Yan
    Liang Liu
    Tsinghua Science and Technology, 2018, 23 (05) : 586 - 598
  • [28] Synthesis of Adaptive Side-Channel Attacks
    Quoc-Sang Phan
    Bang, Lucas
    Pasareanu, Corina S.
    Malacaria, Pasquale
    Bultan, Tevfik
    2017 IEEE 30TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2017, : 328 - 342
  • [29] Side-Channel Attacks in a Real Scenario
    Tang, Ming
    Luo, Maixing
    Zhou, Junfeng
    Yang, Zhen
    Guo, Zhipeng
    Yan, Fei
    Liu, Liang
    TSINGHUA SCIENCE AND TECHNOLOGY, 2018, 23 (05) : 586 - 598
  • [30] Side-Channel Attacks on Cryptographic Software
    Lawson, Nate
    IEEE SECURITY & PRIVACY, 2009, 7 (06) : 65 - 68