Secure Broadcasting of Two Encrypted Sources under Side-Channel Attacks

被引:0
|
作者
Santoso, Bagus [1 ]
Oohama, Yasutada [1 ]
机构
[1] Univ Electrocommun, Tokyo, Japan
关键词
D O I
10.1109/isit.2019.8849849
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We consider the secure communication problem of broadcasting of two encrypted sources against an adversary which launches side-channel attacks. The adversary is not only allowed to eavesdrop the ciphertexts in the public communication channel but is also allowed to obtain the side information on the secret keys via the side-channel. In this paper, we propose a theoretical framework to solve this problem and also propose a countermeasure based on the post-encryption-compression paradigm. We provide an explicit sufficient condition to attain the exponential decay of the information leakage as the block lengths of encrypted sources become large.
引用
收藏
页码:305 / 309
页数:5
相关论文
共 50 条
  • [41] Side-Channel Attacks on Mobile and Wearable Systems
    Nahapetian, Ani
    2016 13TH IEEE ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC), 2016,
  • [42] A Survey of Side-Channel Attacks on Caches and Countermeasures
    Yangdi Lyu
    Prabhat Mishra
    Journal of Hardware and Systems Security, 2018, 2 (1) : 33 - 50
  • [43] Side-Channel Attacks on Shared Search Indexes
    Wang, Liang
    Grubbs, Paul
    Lu, Jiahui
    Bindschaedler, Vincent
    Cash, David
    Ristenpart, Thomas
    2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2017, : 673 - 692
  • [44] Side-Channel Expectation-Maximization Attacks
    Béguinot, Julien
    Cheng, Wei
    Guilley, Sylvain
    Rioul, Olivier
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2022, 2022 (04): : 774 - 799
  • [45] A tutorial on physical security and side-channel attacks
    Koeune, F
    Standaert, FX
    FOUNDATIONS OF SECURITY ANALYSIS AND DESIGN III, 2005, 3655 : 78 - 108
  • [46] SonarSnoop: active acoustic side-channel attacks
    Cheng, Peng
    Bagci, Ibrahim Ethem
    Roedig, Utz
    Yan, Jeff
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2020, 19 (02) : 213 - 228
  • [47] Side-Channel Attacks and Machine Learning Approach
    Levina, Alia
    Sleptsova, Daria
    Zaitsev, Oleg
    2016 18TH CONFERENCE OF OPEN INNOVATIONS ASSOCIATION AND SEMINAR ON INFORMATION SECURITY AND PROTECTION OF INFORMATION TECHNOLOGY (FRUCT-ISPIT), 2016, : 181 - 186
  • [48] On the Correctness of an Approach against Side-Channel Attacks
    Wang, Peng
    Feng, Dengguo
    Wu, Wenling
    Zhang, Liting
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS: 5TH INTERNATIONAL CONFERENCE, ISPEC 2009, 2009, 5451 : 336 - +
  • [49] How to Compare Profiled Side-Channel Attacks?
    Standaert, Francois-Xavier
    Koeune, Francois
    Schindler, Werner
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, 2009, 5536 : 485 - +
  • [50] On the Feasibility of Side-Channel Attacks in a Virtualized Environment
    Vateva-Gurova, Tsvetoslava
    Luna, Jesus
    Pellegrino, Giancarlo
    Suri, Neeraj
    E-BUSINESS AND TELECOMMUNICATIONS, ICETE 2014, 2015, 554 : 319 - 339