: A Hardware-Oriented Trapdoor Cipher View Full Text


Ontology type: schema:Chapter      Open Access: True


Chapter Info

DATE

2007-01-01

AUTHORS

Jean-Philippe Aumasson , Matthieu Finiasz , Willi Meier , Serge Vaudenay

ABSTRACT

This paper improves the Finiasz-Vaudenay construction of \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$\mathcal{TCH}o$\end{document}, a hardware-oriented public-key cryptosystem, whose security relies on the hardness of finding a low-weight multiple of a given polynomial, and on the decoding of certain noisy cyclic linear codes. Our improvement makes it possible to decrypt in polynomial time (instead of exponential time), to directly prove semantic security (instead of one-wayness), and to achieve pretty good asymptotic performances. We further build IND-CCA secure schemes using the KEM/DEM and Fujisaki-Okamoto hybrid encryption frameworks in the random oracle model. This can encrypt an arbitrary message with an overhead of about 5 Kb in less than 15 ms, on an ASIC of about 10 000 gates at 4 MHz. More... »

PAGES

184-199

Book

TITLE

Information Security and Privacy

ISBN

978-3-540-73457-4
978-3-540-73458-1

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-540-73458-1_15

DOI

http://dx.doi.org/10.1007/978-3-540-73458-1_15

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1020221021


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Data Format", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "FHNW, Windisch, Switzerland", 
          "id": "http://www.grid.ac/institutes/grid.410380.e", 
          "name": [
            "FHNW, Windisch, Switzerland"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Aumasson", 
        "givenName": "Jean-Philippe", 
        "id": "sg:person.012606440341.66", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012606440341.66"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "ENSTA, Paris, France", 
          "id": "http://www.grid.ac/institutes/grid.434223.0", 
          "name": [
            "ENSTA, Paris, France"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Finiasz", 
        "givenName": "Matthieu", 
        "id": "sg:person.013052140635.59", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013052140635.59"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "FHNW, Windisch, Switzerland", 
          "id": "http://www.grid.ac/institutes/grid.410380.e", 
          "name": [
            "FHNW, Windisch, Switzerland"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Meier", 
        "givenName": "Willi", 
        "id": "sg:person.07653531142.18", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07653531142.18"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "EPFL, Lausanne, Switzerland", 
          "id": "http://www.grid.ac/institutes/grid.5333.6", 
          "name": [
            "EPFL, Lausanne, Switzerland"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Vaudenay", 
        "givenName": "Serge", 
        "id": "sg:person.01353240467.39", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.01353240467.39"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2007-01-01", 
    "datePublishedReg": "2007-01-01", 
    "description": "This paper improves the Finiasz-Vaudenay construction of \\documentclass[12pt]{minimal}\n\t\t\t\t\\usepackage{amsmath}\n\t\t\t\t\\usepackage{wasysym}\n\t\t\t\t\\usepackage{amsfonts}\n\t\t\t\t\\usepackage{amssymb}\n\t\t\t\t\\usepackage{amsbsy}\n\t\t\t\t\\usepackage{mathrsfs}\n\t\t\t\t\\usepackage{upgreek}\n\t\t\t\t\\setlength{\\oddsidemargin}{-69pt}\n\t\t\t\t\\begin{document}$\\mathcal{TCH}o$\\end{document}, a hardware-oriented public-key cryptosystem, whose security relies on the hardness of finding a low-weight multiple of a given polynomial, and on the decoding of certain noisy cyclic linear codes. Our improvement makes it possible to decrypt in polynomial time (instead of exponential time), to directly prove semantic security (instead of one-wayness), and to achieve pretty good asymptotic performances. We further build IND-CCA secure schemes using the KEM/DEM and Fujisaki-Okamoto hybrid encryption frameworks in the random oracle model. This can encrypt an arbitrary message with an overhead of about 5 Kb in less than 15 ms, on an ASIC of about 10 000 gates at 4 MHz.", 
    "editor": [
      {
        "familyName": "Pieprzyk", 
        "givenName": "Josef", 
        "type": "Person"
      }, 
      {
        "familyName": "Ghodosi", 
        "givenName": "Hossein", 
        "type": "Person"
      }, 
      {
        "familyName": "Dawson", 
        "givenName": "Ed", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-540-73458-1_15", 
    "isAccessibleForFree": true, 
    "isPartOf": {
      "isbn": [
        "978-3-540-73457-4", 
        "978-3-540-73458-1"
      ], 
      "name": "Information Security and Privacy", 
      "type": "Book"
    }, 
    "keywords": [
      "random oracle model", 
      "KEM/DEM", 
      "public key cryptosystem", 
      "cyclic linear codes", 
      "low-weight multiples", 
      "secure scheme", 
      "hybrid encryption", 
      "semantic security", 
      "oracle model", 
      "better asymptotic performance", 
      "polynomial time", 
      "arbitrary messages", 
      "linear codes", 
      "security", 
      "encryption", 
      "decrypt", 
      "cryptosystem", 
      "overhead", 
      "asymptotic performance", 
      "hardware", 
      "cipher", 
      "decoding", 
      "messages", 
      "code", 
      "ASIC", 
      "scheme", 
      "performance", 
      "model", 
      "construction", 
      "DEM", 
      "improvement", 
      "time", 
      "polynomials", 
      "multiples", 
      "gate", 
      "MHz", 
      "kb", 
      "hardness", 
      "MS", 
      "paper"
    ], 
    "name": ": A Hardware-Oriented Trapdoor Cipher", 
    "pagination": "184-199", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1020221021"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-540-73458-1_15"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-540-73458-1_15", 
      "https://app.dimensions.ai/details/publication/pub.1020221021"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-08-04T17:19", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20220804/entities/gbq_results/chapter/chapter_394.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/978-3-540-73458-1_15"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-73458-1_15'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-73458-1_15'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-73458-1_15'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-73458-1_15'


 

This table displays all metadata directly associated to this object as RDF triples.

136 TRIPLES      22 PREDICATES      64 URIs      57 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-540-73458-1_15 schema:about anzsrc-for:08
2 anzsrc-for:0804
3 schema:author N995de926fd424399a94ae844d6bee43a
4 schema:datePublished 2007-01-01
5 schema:datePublishedReg 2007-01-01
6 schema:description This paper improves the Finiasz-Vaudenay construction of \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$\mathcal{TCH}o$\end{document}, a hardware-oriented public-key cryptosystem, whose security relies on the hardness of finding a low-weight multiple of a given polynomial, and on the decoding of certain noisy cyclic linear codes. Our improvement makes it possible to decrypt in polynomial time (instead of exponential time), to directly prove semantic security (instead of one-wayness), and to achieve pretty good asymptotic performances. We further build IND-CCA secure schemes using the KEM/DEM and Fujisaki-Okamoto hybrid encryption frameworks in the random oracle model. This can encrypt an arbitrary message with an overhead of about 5 Kb in less than 15 ms, on an ASIC of about 10 000 gates at 4 MHz.
7 schema:editor Ndb7fa0ebe4ad47d295469fb05498f392
8 schema:genre chapter
9 schema:isAccessibleForFree true
10 schema:isPartOf N6c475d5646434a29a984d1ab07356216
11 schema:keywords ASIC
12 DEM
13 KEM/DEM
14 MHz
15 MS
16 arbitrary messages
17 asymptotic performance
18 better asymptotic performance
19 cipher
20 code
21 construction
22 cryptosystem
23 cyclic linear codes
24 decoding
25 decrypt
26 encryption
27 gate
28 hardness
29 hardware
30 hybrid encryption
31 improvement
32 kb
33 linear codes
34 low-weight multiples
35 messages
36 model
37 multiples
38 oracle model
39 overhead
40 paper
41 performance
42 polynomial time
43 polynomials
44 public key cryptosystem
45 random oracle model
46 scheme
47 secure scheme
48 security
49 semantic security
50 time
51 schema:name : A Hardware-Oriented Trapdoor Cipher
52 schema:pagination 184-199
53 schema:productId N1b2a57ee6aee4b709a87bdc18f6395f4
54 N7aff9dc3a41f4ce0bacb00e7dac2d63a
55 schema:publisher N1c9899bac80b4b9b9d72e0ac2640e6ec
56 schema:sameAs https://app.dimensions.ai/details/publication/pub.1020221021
57 https://doi.org/10.1007/978-3-540-73458-1_15
58 schema:sdDatePublished 2022-08-04T17:19
59 schema:sdLicense https://scigraph.springernature.com/explorer/license/
60 schema:sdPublisher N8fe4f6d16c0d4104ae479a00ad04294f
61 schema:url https://doi.org/10.1007/978-3-540-73458-1_15
62 sgo:license sg:explorer/license/
63 sgo:sdDataset chapters
64 rdf:type schema:Chapter
65 N0e5f37ff2dbe4825bc695ea37b621a22 rdf:first sg:person.07653531142.18
66 rdf:rest N1469aba449d84451946f362c1dafe3fa
67 N1469aba449d84451946f362c1dafe3fa rdf:first sg:person.01353240467.39
68 rdf:rest rdf:nil
69 N1b2a57ee6aee4b709a87bdc18f6395f4 schema:name doi
70 schema:value 10.1007/978-3-540-73458-1_15
71 rdf:type schema:PropertyValue
72 N1c9899bac80b4b9b9d72e0ac2640e6ec schema:name Springer Nature
73 rdf:type schema:Organisation
74 N2ba6b23cce2348ea82af02a31dda4adb rdf:first Na9bc79168aa44a21bcece8edacc6281e
75 rdf:rest Nd9416ef44de54059af44bc454280e099
76 N3797d54a1c32430993ee7f5183b097ac schema:familyName Dawson
77 schema:givenName Ed
78 rdf:type schema:Person
79 N6ade7aa042c44c8c8455d67eab955c64 schema:familyName Pieprzyk
80 schema:givenName Josef
81 rdf:type schema:Person
82 N6c475d5646434a29a984d1ab07356216 schema:isbn 978-3-540-73457-4
83 978-3-540-73458-1
84 schema:name Information Security and Privacy
85 rdf:type schema:Book
86 N7aff9dc3a41f4ce0bacb00e7dac2d63a schema:name dimensions_id
87 schema:value pub.1020221021
88 rdf:type schema:PropertyValue
89 N8fe4f6d16c0d4104ae479a00ad04294f schema:name Springer Nature - SN SciGraph project
90 rdf:type schema:Organization
91 N995de926fd424399a94ae844d6bee43a rdf:first sg:person.012606440341.66
92 rdf:rest Ne4f0327b46284a0286addc27e504a2a6
93 Na9bc79168aa44a21bcece8edacc6281e schema:familyName Ghodosi
94 schema:givenName Hossein
95 rdf:type schema:Person
96 Nd9416ef44de54059af44bc454280e099 rdf:first N3797d54a1c32430993ee7f5183b097ac
97 rdf:rest rdf:nil
98 Ndb7fa0ebe4ad47d295469fb05498f392 rdf:first N6ade7aa042c44c8c8455d67eab955c64
99 rdf:rest N2ba6b23cce2348ea82af02a31dda4adb
100 Ne4f0327b46284a0286addc27e504a2a6 rdf:first sg:person.013052140635.59
101 rdf:rest N0e5f37ff2dbe4825bc695ea37b621a22
102 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
103 schema:name Information and Computing Sciences
104 rdf:type schema:DefinedTerm
105 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
106 schema:name Data Format
107 rdf:type schema:DefinedTerm
108 sg:person.012606440341.66 schema:affiliation grid-institutes:grid.410380.e
109 schema:familyName Aumasson
110 schema:givenName Jean-Philippe
111 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012606440341.66
112 rdf:type schema:Person
113 sg:person.013052140635.59 schema:affiliation grid-institutes:grid.434223.0
114 schema:familyName Finiasz
115 schema:givenName Matthieu
116 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013052140635.59
117 rdf:type schema:Person
118 sg:person.01353240467.39 schema:affiliation grid-institutes:grid.5333.6
119 schema:familyName Vaudenay
120 schema:givenName Serge
121 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.01353240467.39
122 rdf:type schema:Person
123 sg:person.07653531142.18 schema:affiliation grid-institutes:grid.410380.e
124 schema:familyName Meier
125 schema:givenName Willi
126 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07653531142.18
127 rdf:type schema:Person
128 grid-institutes:grid.410380.e schema:alternateName FHNW, Windisch, Switzerland
129 schema:name FHNW, Windisch, Switzerland
130 rdf:type schema:Organization
131 grid-institutes:grid.434223.0 schema:alternateName ENSTA, Paris, France
132 schema:name ENSTA, Paris, France
133 rdf:type schema:Organization
134 grid-institutes:grid.5333.6 schema:alternateName EPFL, Lausanne, Switzerland
135 schema:name EPFL, Lausanne, Switzerland
136 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...