Secure Wire Shuffling in the Probing Model

نویسندگان

چکیده

In this paper we describe the first improvement of wire shuffling countermeasure against side-channel attacks described by Ishai, Sahai and Wagner at Crypto 2003. More precisely, show how to get worst case statistical security t probes with running time $${\mathcal O}(t)$$ instead O}(t \log t)$$ ; our construction is also much simpler. Recall that classical masking achieves perfect but O}(t^2)$$ . We a practical implementation for AES outperforms $$t \ge 6\,000$$

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Multi-party Shuffling

In secure multi-party shuffling, multiple parties, each holding an input, want to agree on a random permutation of their inputs while keeping the permutation secret. This problem is important as a primitive in many privacy-preserving applications such as anonymous communication, location-based services, and electronic voting. Known techniques for solving this problem suffer from poor scalabilit...

متن کامل

Exploring the Geometric Model of Riffle Shuffling

Card shuffling is an interesting topic to explore because of its complexity. Initially, card shuffling seems simple because it is ubitquitous. The majority of people know how to shuffle a deck of cards but few consider the math behind it. However, when it comes to analyzing the elements of card shuffling, it incorporates linear algebra, group theory, probability theory, and Markov Chains. When ...

متن کامل

Towards Secure Two-Party Computation from the Wire-Tap Channel

We introduce a new protocol for secure two-party computation of linear functions in the semi-honest model, based on coding techniques. We first establish a parallel between the second version of the wire-tap channel model and secure two-party computation. This leads us to our protocol, that combines linear coset coding and oblivious transfer techniques. Our construction requires the use of bina...

متن کامل

Cards-Shuffling Model for Urban Development

Hierarchy of cities reflects the ubiquitous structure frequently observed in the natural world and social institutions. Where there is a hierarchy with cascade structure, there is a Zipf’s rank-size distribution, and vice versa. However, we have no theory to explain the spatial dynamics associated with Zipf’s law of cities. In this paper, a new angle of view is proposed to find the simple rules...

متن کامل

Bit Shuffling Query Tree Algorithm for Secure Communication in RFID Networks

RFID uses radio frequency waves to track and identify objects. RFID system consists of tags and readers. Passive RFID tags are more popular now days due to its simpler circuitry, lower weight and lower cost. Generally passive tags are attached with an object for unique identification. A tag contains information about the particular product, to which it is attached. RFID reader is used to interr...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Lecture Notes in Computer Science

سال: 2021

ISSN: ['1611-3349', '0302-9743']

DOI: https://doi.org/10.1007/978-3-030-84252-9_8