: A Hardware-Oriented Trapdoor Cipher View Full Text


Ontology type: schema:Chapter      Open Access: True


Chapter Info

DATE

2007-01-01

AUTHORS

Jean-Philippe Aumasson , Matthieu Finiasz , Willi Meier , Serge Vaudenay

ABSTRACT

This paper improves the Finiasz-Vaudenay construction of \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$\mathcal{TCH}o$\end{document}, a hardware-oriented public-key cryptosystem, whose security relies on the hardness of finding a low-weight multiple of a given polynomial, and on the decoding of certain noisy cyclic linear codes. Our improvement makes it possible to decrypt in polynomial time (instead of exponential time), to directly prove semantic security (instead of one-wayness), and to achieve pretty good asymptotic performances. We further build IND-CCA secure schemes using the KEM/DEM and Fujisaki-Okamoto hybrid encryption frameworks in the random oracle model. This can encrypt an arbitrary message with an overhead of about 5 Kb in less than 15 ms, on an ASIC of about 10 000 gates at 4 MHz. More... »

PAGES

184-199

Book

TITLE

Information Security and Privacy

ISBN

978-3-540-73457-4
978-3-540-73458-1

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-540-73458-1_15

DOI

http://dx.doi.org/10.1007/978-3-540-73458-1_15

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1020221021


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Data Format", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "FHNW, Windisch, Switzerland", 
          "id": "http://www.grid.ac/institutes/grid.410380.e", 
          "name": [
            "FHNW, Windisch, Switzerland"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Aumasson", 
        "givenName": "Jean-Philippe", 
        "id": "sg:person.012606440341.66", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012606440341.66"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "ENSTA, Paris, France", 
          "id": "http://www.grid.ac/institutes/grid.434223.0", 
          "name": [
            "ENSTA, Paris, France"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Finiasz", 
        "givenName": "Matthieu", 
        "id": "sg:person.013052140635.59", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013052140635.59"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "FHNW, Windisch, Switzerland", 
          "id": "http://www.grid.ac/institutes/grid.410380.e", 
          "name": [
            "FHNW, Windisch, Switzerland"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Meier", 
        "givenName": "Willi", 
        "id": "sg:person.07653531142.18", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07653531142.18"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "EPFL, Lausanne, Switzerland", 
          "id": "http://www.grid.ac/institutes/grid.5333.6", 
          "name": [
            "EPFL, Lausanne, Switzerland"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Vaudenay", 
        "givenName": "Serge", 
        "id": "sg:person.01353240467.39", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.01353240467.39"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2007-01-01", 
    "datePublishedReg": "2007-01-01", 
    "description": "This paper improves the Finiasz-Vaudenay construction of \\documentclass[12pt]{minimal}\n\t\t\t\t\\usepackage{amsmath}\n\t\t\t\t\\usepackage{wasysym}\n\t\t\t\t\\usepackage{amsfonts}\n\t\t\t\t\\usepackage{amssymb}\n\t\t\t\t\\usepackage{amsbsy}\n\t\t\t\t\\usepackage{mathrsfs}\n\t\t\t\t\\usepackage{upgreek}\n\t\t\t\t\\setlength{\\oddsidemargin}{-69pt}\n\t\t\t\t\\begin{document}$\\mathcal{TCH}o$\\end{document}, a hardware-oriented public-key cryptosystem, whose security relies on the hardness of finding a low-weight multiple of a given polynomial, and on the decoding of certain noisy cyclic linear codes. Our improvement makes it possible to decrypt in polynomial time (instead of exponential time), to directly prove semantic security (instead of one-wayness), and to achieve pretty good asymptotic performances. We further build IND-CCA secure schemes using the KEM/DEM and Fujisaki-Okamoto hybrid encryption frameworks in the random oracle model. This can encrypt an arbitrary message with an overhead of about 5 Kb in less than 15 ms, on an ASIC of about 10 000 gates at 4 MHz.", 
    "editor": [
      {
        "familyName": "Pieprzyk", 
        "givenName": "Josef", 
        "type": "Person"
      }, 
      {
        "familyName": "Ghodosi", 
        "givenName": "Hossein", 
        "type": "Person"
      }, 
      {
        "familyName": "Dawson", 
        "givenName": "Ed", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-540-73458-1_15", 
    "inLanguage": "en", 
    "isAccessibleForFree": true, 
    "isPartOf": {
      "isbn": [
        "978-3-540-73457-4", 
        "978-3-540-73458-1"
      ], 
      "name": "Information Security and Privacy", 
      "type": "Book"
    }, 
    "keywords": [
      "random oracle model", 
      "public key cryptosystem", 
      "KEM/DEM", 
      "cyclic linear codes", 
      "low-weight multiples", 
      "hybrid encryption", 
      "secure scheme", 
      "semantic security", 
      "oracle model", 
      "better asymptotic performance", 
      "polynomial time", 
      "arbitrary messages", 
      "linear codes", 
      "security", 
      "encryption", 
      "decrypt", 
      "cryptosystem", 
      "overhead", 
      "hardware", 
      "asymptotic performance", 
      "cipher", 
      "decoding", 
      "messages", 
      "code", 
      "ASIC", 
      "scheme", 
      "performance", 
      "model", 
      "construction", 
      "DEM", 
      "improvement", 
      "time", 
      "polynomials", 
      "multiples", 
      "gate", 
      "MHz", 
      "kb", 
      "hardness", 
      "MS", 
      "paper"
    ], 
    "name": ": A Hardware-Oriented Trapdoor Cipher", 
    "pagination": "184-199", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1020221021"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-540-73458-1_15"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-540-73458-1_15", 
      "https://app.dimensions.ai/details/publication/pub.1020221021"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-06-01T22:35", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20220601/entities/gbq_results/chapter/chapter_457.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/978-3-540-73458-1_15"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-73458-1_15'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-73458-1_15'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-73458-1_15'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-73458-1_15'


 

This table displays all metadata directly associated to this object as RDF triples.

137 TRIPLES      23 PREDICATES      65 URIs      58 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-540-73458-1_15 schema:about anzsrc-for:08
2 anzsrc-for:0804
3 schema:author Nc83a21da4e79432fbab93e10c1a4770a
4 schema:datePublished 2007-01-01
5 schema:datePublishedReg 2007-01-01
6 schema:description This paper improves the Finiasz-Vaudenay construction of \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$\mathcal{TCH}o$\end{document}, a hardware-oriented public-key cryptosystem, whose security relies on the hardness of finding a low-weight multiple of a given polynomial, and on the decoding of certain noisy cyclic linear codes. Our improvement makes it possible to decrypt in polynomial time (instead of exponential time), to directly prove semantic security (instead of one-wayness), and to achieve pretty good asymptotic performances. We further build IND-CCA secure schemes using the KEM/DEM and Fujisaki-Okamoto hybrid encryption frameworks in the random oracle model. This can encrypt an arbitrary message with an overhead of about 5 Kb in less than 15 ms, on an ASIC of about 10 000 gates at 4 MHz.
7 schema:editor N0506b3db3b1140f08cbfa2597340f510
8 schema:genre chapter
9 schema:inLanguage en
10 schema:isAccessibleForFree true
11 schema:isPartOf Nfb535b6a07f64f86ba3375a2a609298c
12 schema:keywords ASIC
13 DEM
14 KEM/DEM
15 MHz
16 MS
17 arbitrary messages
18 asymptotic performance
19 better asymptotic performance
20 cipher
21 code
22 construction
23 cryptosystem
24 cyclic linear codes
25 decoding
26 decrypt
27 encryption
28 gate
29 hardness
30 hardware
31 hybrid encryption
32 improvement
33 kb
34 linear codes
35 low-weight multiples
36 messages
37 model
38 multiples
39 oracle model
40 overhead
41 paper
42 performance
43 polynomial time
44 polynomials
45 public key cryptosystem
46 random oracle model
47 scheme
48 secure scheme
49 security
50 semantic security
51 time
52 schema:name : A Hardware-Oriented Trapdoor Cipher
53 schema:pagination 184-199
54 schema:productId N0e56adacbaf2462daed8bbb060c6d2ee
55 N9b96b7c00b4c40db9e44ec31261ededc
56 schema:publisher Ne786da87fd2d4629a100294f98910f59
57 schema:sameAs https://app.dimensions.ai/details/publication/pub.1020221021
58 https://doi.org/10.1007/978-3-540-73458-1_15
59 schema:sdDatePublished 2022-06-01T22:35
60 schema:sdLicense https://scigraph.springernature.com/explorer/license/
61 schema:sdPublisher Na16e10d391784fa4bea83f009c493e20
62 schema:url https://doi.org/10.1007/978-3-540-73458-1_15
63 sgo:license sg:explorer/license/
64 sgo:sdDataset chapters
65 rdf:type schema:Chapter
66 N0506b3db3b1140f08cbfa2597340f510 rdf:first N4f1a0edf29084afe918571054e61dea8
67 rdf:rest N2e249be77ce042d788a37074b75c58c8
68 N0e56adacbaf2462daed8bbb060c6d2ee schema:name dimensions_id
69 schema:value pub.1020221021
70 rdf:type schema:PropertyValue
71 N2de7ab373f004726a191510a736b924c rdf:first N6a6fe10940994bfea7b2c831d365c511
72 rdf:rest rdf:nil
73 N2e249be77ce042d788a37074b75c58c8 rdf:first Nd4a33ac26e9544089705adc0cbc6a542
74 rdf:rest N2de7ab373f004726a191510a736b924c
75 N4f1a0edf29084afe918571054e61dea8 schema:familyName Pieprzyk
76 schema:givenName Josef
77 rdf:type schema:Person
78 N6a6fe10940994bfea7b2c831d365c511 schema:familyName Dawson
79 schema:givenName Ed
80 rdf:type schema:Person
81 N8dcdbd6376054c65aff3d72f812175e0 rdf:first sg:person.07653531142.18
82 rdf:rest Nad8b7b78f65c4108a74e200678d1adab
83 N9b96b7c00b4c40db9e44ec31261ededc schema:name doi
84 schema:value 10.1007/978-3-540-73458-1_15
85 rdf:type schema:PropertyValue
86 Na16e10d391784fa4bea83f009c493e20 schema:name Springer Nature - SN SciGraph project
87 rdf:type schema:Organization
88 Nad8b7b78f65c4108a74e200678d1adab rdf:first sg:person.01353240467.39
89 rdf:rest rdf:nil
90 Nc83a21da4e79432fbab93e10c1a4770a rdf:first sg:person.012606440341.66
91 rdf:rest Ncdd7aca9d011465a812ffe90a21e8910
92 Ncdd7aca9d011465a812ffe90a21e8910 rdf:first sg:person.013052140635.59
93 rdf:rest N8dcdbd6376054c65aff3d72f812175e0
94 Nd4a33ac26e9544089705adc0cbc6a542 schema:familyName Ghodosi
95 schema:givenName Hossein
96 rdf:type schema:Person
97 Ne786da87fd2d4629a100294f98910f59 schema:name Springer Nature
98 rdf:type schema:Organisation
99 Nfb535b6a07f64f86ba3375a2a609298c schema:isbn 978-3-540-73457-4
100 978-3-540-73458-1
101 schema:name Information Security and Privacy
102 rdf:type schema:Book
103 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
104 schema:name Information and Computing Sciences
105 rdf:type schema:DefinedTerm
106 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
107 schema:name Data Format
108 rdf:type schema:DefinedTerm
109 sg:person.012606440341.66 schema:affiliation grid-institutes:grid.410380.e
110 schema:familyName Aumasson
111 schema:givenName Jean-Philippe
112 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012606440341.66
113 rdf:type schema:Person
114 sg:person.013052140635.59 schema:affiliation grid-institutes:grid.434223.0
115 schema:familyName Finiasz
116 schema:givenName Matthieu
117 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013052140635.59
118 rdf:type schema:Person
119 sg:person.01353240467.39 schema:affiliation grid-institutes:grid.5333.6
120 schema:familyName Vaudenay
121 schema:givenName Serge
122 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.01353240467.39
123 rdf:type schema:Person
124 sg:person.07653531142.18 schema:affiliation grid-institutes:grid.410380.e
125 schema:familyName Meier
126 schema:givenName Willi
127 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07653531142.18
128 rdf:type schema:Person
129 grid-institutes:grid.410380.e schema:alternateName FHNW, Windisch, Switzerland
130 schema:name FHNW, Windisch, Switzerland
131 rdf:type schema:Organization
132 grid-institutes:grid.434223.0 schema:alternateName ENSTA, Paris, France
133 schema:name ENSTA, Paris, France
134 rdf:type schema:Organization
135 grid-institutes:grid.5333.6 schema:alternateName EPFL, Lausanne, Switzerland
136 schema:name EPFL, Lausanne, Switzerland
137 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...