2020
DOI: 10.46586/tosc.v2020.i3.46-86
|View full text |Cite
|
Sign up to set email alerts
|

Dasta – Alternative Linear Layer for Rasta

Abstract: Progress in the areas of multi-party computation (MPC) and fully homomorphic encryption (FHE) caused the demand of new design strategies, that minimize the number of multiplications in symmetric primitives. Rasta is an approach for a family of stream ciphers with an exceptional low AND depth, which equals the number of ANDs per encrypted bit. This is achieved in particular by randomizing parts of the computation with the help of a PRNG, implying that the security arguments rely on the provided randomness and t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
6
2
1
1

Relationship

0
10

Authors

Journals

citations
Cited by 19 publications
(7 citation statements)
references
References 13 publications
0
5
0
Order By: Relevance
“…However PKE has higher ciphertext expansion and complexity than SKE. In this framework, low-depth symmetric key ciphers such as [204], [205], [206] can provide noticeable gains.…”
Section: He In Fog Computing For Iotmentioning
confidence: 99%
“…However PKE has higher ciphertext expansion and complexity than SKE. In this framework, low-depth symmetric key ciphers such as [204], [205], [206] can provide noticeable gains.…”
Section: He In Fog Computing For Iotmentioning
confidence: 99%
“…However PKE has higher ciphertext expansion and complexity than SKE. In this framework, low-depth symmetric key ciphers such as [227], [228], [229] can provide noticeable gains. Fog computing is not limited to the Smart City scenario.…”
Section: He In Fog Computing For Iotmentioning
confidence: 99%
“…However, AES was not a good suitor for building HHE schemes, mainly due to its large multiplicative depth. Thus, research on the field of HHE took a new turn where the main focus has been shifted to the design of symmetric ciphers with different optimization criteria, depending on the use-case each work addresses [20,5,16,22,32,29,23] -Different Approaches: Another emerging cryptographic primitive that can be used to outsource computations in a privacy-preserving is Functional Encryption (FE). In FE, each decryption key sk f is connected to a function f .…”
Section: Related Workmentioning
confidence: 99%