Authors
Alexander Russell, Qiang Tang, Moti Yung, Hong-Sheng Zhou
Publication date
2016
Conference
Advances in Cryptology–ASIACRYPT 2016: 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II 22
Pages
34-64
Publisher
Springer Berlin Heidelberg
Description
Kleptography, introduced 20 years ago by Young and Yung [Crypto ’96], considers the (in)security of malicious implementations (or instantiations) of standard cryptographic primitives that may embed a “backdoor” into the system. Remarkably, crippling subliminal attacks are possible even if the subverted cryptosystem produces output indistinguishable from a truly secure “reference implementation.” Bellare, Paterson, and Rogaway [Crypto ’14] recently initiated a formal study of such attacks on symmetric key encryption algorithms, demonstrating that kleptographic attacks can be mounted in broad generality against randomized components of cryptographic systems.
We enlarge the scope of current work on the problem by permitting adversarial subversion of (randomized) key generation; in particular, we initiate the study of cryptography in the complete subversion model, where all relevant …
Total citations
20152016201720182019202020212022202320242101291392413138
Scholar articles
A Russell, Q Tang, M Yung, HS Zhou - Advances in Cryptology–ASIACRYPT 2016: 22nd …, 2016