2010 23rd IEEE Computer Security Foundations Symposium 2010
DOI: 10.1109/csf.2010.11
|View full text |Cite
|
Sign up to set email alerts
|

Vulnerability Bounds and Leakage Resilience of Blinded Cryptography under Timing Attacks

Abstract: Abstract-We establish formal bounds for the number of min-entropy bits that can be extracted in a timing attack against a cryptosystem that is protected by blinding, the state-of-the art countermeasure against timing attacks. Compared with existing bounds, our bounds are both tighter and of greater operational significance, in that they directly address the key's one-guess vulnerability. Moreover, we show that any semantically secure public-key cryptosystem remains semantically secure in the presence of timing… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

1
107
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 79 publications
(108 citation statements)
references
References 25 publications
1
107
0
Order By: Relevance
“…Quantitative Information Flow (qif) is a well-established approach to confidentiality analysis: the basic idea is measuring how much information flows from sensitive to observable data, relying on tools from Information Theory [14,3,12,32,11,4,27,5,6].…”
Section: Introductionmentioning
confidence: 99%
“…Quantitative Information Flow (qif) is a well-established approach to confidentiality analysis: the basic idea is measuring how much information flows from sensitive to observable data, relying on tools from Information Theory [14,3,12,32,11,4,27,5,6].…”
Section: Introductionmentioning
confidence: 99%
“…There is a large body of recent literature on qif [8,19,5,6] and dp [13,14]. The earliest proposal of a worst-case security notion is, to the best of our knowledge, found in [15].…”
Section: Related Workmentioning
confidence: 99%
“…[19]. We would also like to apply and possibly extend the results of the present paper to the setting of de-anonymization attacks on dataset containing micro-data.…”
Section: Conclusion and Further Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Henceforth, a major challenge is being able to give simple and tight bounds on leakage in general, or exact expressions for some important cases. For instance, Köpf and Smith (2010) give a simple formula for the min-entropy capacity of a system, which corresponds to the worst-case leakage after a single observation under one-try attacks.…”
mentioning
confidence: 99%