Secure Wire Shuffling in the Probing Model
نویسندگان
چکیده
In this paper we describe the first improvement of wire shuffling countermeasure against side-channel attacks described by Ishai, Sahai and Wagner at Crypto 2003. More precisely, show how to get worst case statistical security t probes with running time $${\mathcal O}(t)$$ instead O}(t \log t)$$ ; our construction is also much simpler. Recall that classical masking achieves perfect but O}(t^2)$$ . We a practical implementation for AES outperforms $$t \ge 6\,000$$
منابع مشابه
Secure Multi-party Shuffling
In secure multi-party shuffling, multiple parties, each holding an input, want to agree on a random permutation of their inputs while keeping the permutation secret. This problem is important as a primitive in many privacy-preserving applications such as anonymous communication, location-based services, and electronic voting. Known techniques for solving this problem suffer from poor scalabilit...
متن کاملExploring the Geometric Model of Riffle Shuffling
Card shuffling is an interesting topic to explore because of its complexity. Initially, card shuffling seems simple because it is ubitquitous. The majority of people know how to shuffle a deck of cards but few consider the math behind it. However, when it comes to analyzing the elements of card shuffling, it incorporates linear algebra, group theory, probability theory, and Markov Chains. When ...
متن کاملTowards Secure Two-Party Computation from the Wire-Tap Channel
We introduce a new protocol for secure two-party computation of linear functions in the semi-honest model, based on coding techniques. We first establish a parallel between the second version of the wire-tap channel model and secure two-party computation. This leads us to our protocol, that combines linear coset coding and oblivious transfer techniques. Our construction requires the use of bina...
متن کاملCards-Shuffling Model for Urban Development
Hierarchy of cities reflects the ubiquitous structure frequently observed in the natural world and social institutions. Where there is a hierarchy with cascade structure, there is a Zipf’s rank-size distribution, and vice versa. However, we have no theory to explain the spatial dynamics associated with Zipf’s law of cities. In this paper, a new angle of view is proposed to find the simple rules...
متن کاملBit Shuffling Query Tree Algorithm for Secure Communication in RFID Networks
RFID uses radio frequency waves to track and identify objects. RFID system consists of tags and readers. Passive RFID tags are more popular now days due to its simpler circuitry, lower weight and lower cost. Generally passive tags are attached with an object for unique identification. A tag contains information about the particular product, to which it is attached. RFID reader is used to interr...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Lecture Notes in Computer Science
سال: 2021
ISSN: ['1611-3349', '0302-9743']
DOI: https://doi.org/10.1007/978-3-030-84252-9_8