2016
DOI: 10.1007/978-3-662-53887-6_6
|View full text |Cite
|
Sign up to set email alerts
|

Efficient and Provable White-Box Primitives

Abstract: Abstract. In recent years there have been several attempts to build white-box block ciphers whose implementations aim to be incompressible. This includes the weak white-box ASASA construction by Bouillaguet, Biryukov and Khovratovich from Asiacrypt 2014, and the recent space-hard construction by Bogdanov and Isobe from CCS 2015.In this article we propose the first constructions aiming at the same goal while offering provable security guarantees. Moreover we propose concrete instantiations of our constructions,… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
56
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 42 publications
(64 citation statements)
references
References 32 publications
0
56
0
Order By: Relevance
“…Code-hardness is very close to what was first defined as memory-hard whitebox implementation (or weak white-box) in the paper introducing the ASASA crypto-system [BBK14], and later formalized under different names as ( , )-space hardness [BI15,BIT16] or as incompressibility in [FKKM16] following the more general definition from [DLPR14]. In all cases, the aim is the same: the block cipher implementation must be such that it is impossible to write a functionally equivalent implementation with a smaller code.…”
Section: Code Hardnessmentioning
confidence: 99%
See 4 more Smart Citations
“…Code-hardness is very close to what was first defined as memory-hard whitebox implementation (or weak white-box) in the paper introducing the ASASA crypto-system [BBK14], and later formalized under different names as ( , )-space hardness [BI15,BIT16] or as incompressibility in [FKKM16] following the more general definition from [DLPR14]. In all cases, the aim is the same: the block cipher implementation must be such that it is impossible to write a functionally equivalent implementation with a smaller code.…”
Section: Code Hardnessmentioning
confidence: 99%
“…As was pointed out in [FKKM16], what we call code-hardness is also the goal of so-called big-key encryption. For instance, the XKEY2 scheme introduced in [BKR16] achieves this goal: it uses a huge table and a nonce to derive a key of regular size (say, 128 bits) to be used in a standard encryption algorithm, e.g.…”
Section: Code Hardnessmentioning
confidence: 99%
See 3 more Smart Citations