Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1109/FOCS.2008.56guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Leakage-Resilient Cryptography

Published: 25 October 2008 Publication History

Abstract

We construct a stream-cipher $\SC$ whose \emph{implementation} is secure even if a bounded amount of arbitrary (adversarially chosen) information on the internal state of $\SC$ is leaked during computation. This captures \emph{all} possible side-channel attacks on $\SC$ where the amount of information leaked in a given period is bounded, but overall can be arbitrary large.The only other assumption we make on the \emph{implementation} of $\SC$ is that only data that is accessed during computation leaks information. The stream-cipher $\SC$ generates its output in chunks $K_1,K_2,\ldots$ and arbitrary but bounded information leakage is modeled by allowing the adversary to adaptively chose a function $f_\ell:\bin^*\rightarrow\bin^\lambda$ before $K_\ell$ is computed, she then gets $f_\ell(\tau_\ell)$ where $\tau_\ell$ is the internal state of $\SC$ that is accessed during the computation of $K_\ell$.One notion of security we prove for $\SC$ is that $K_\ell$ is indistinguishable from random when given $K_1,\ldots,K_{\ell-1}$, $f_1(\tau_1),\ldots, f_{\ell-1}(\tau_{\ell-1})$ and also the complete internal state of $\SC$ after $K_{\ell}$ has been computed (i.e. $\SC$ is forward-secure). The construction is based on alternating extraction (used in the intrusion-resilient secret-sharing scheme from FOCS'07). We move this concept to the computational setting by proving a lemma that states that the output of any PRG has high HILL pseudoentropy (i.e. is indistinguishable from some distribution with high min-entropy) even if arbitrary information about the seed is leaked. The amount of leakage $\leak$ that we can tolerate in each step depends on the strength of the underlying PRG, it is at least logarithmic, but can be as large as a constant fraction of the internal state of $\SC$ if the PRG is exponentially hard.

Cited By

View all

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
FOCS '08: Proceedings of the 2008 49th Annual IEEE Symposium on Foundations of Computer Science
October 2008
773 pages
ISBN:9780769534367

Publisher

IEEE Computer Society

United States

Publication History

Published: 25 October 2008

Author Tag

  1. side-channel attack, leakage-resilient, stream-cipher

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 24 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2023)Leakage-Resilient Hardness vs RandomnessProceedings of the conference on Proceedings of the 38th Computational Complexity Conference10.4230/LIPIcs.CCC.2023.32(1-20)Online publication date: 17-Jul-2023
  • (2023)Guest Column: New ways of studying the BPP = P conjectureACM SIGACT News10.1145/3604943.360495054:2(44-69)Online publication date: 14-Jun-2023
  • (2023)LENTOFuture Generation Computer Systems10.1016/j.future.2022.09.023139:C(151-166)Online publication date: 1-Feb-2023
  • (2023)Deniable Cryptosystems: Simpler Constructions and Achieving Leakage ResilienceComputer Security – ESORICS 202310.1007/978-3-031-50594-2_2(24-44)Online publication date: 25-Sep-2023
  • (2023)Efficiently Testable Circuits Without ConductivityTheory of Cryptography10.1007/978-3-031-48621-0_5(123-152)Online publication date: 29-Nov-2023
  • (2022)Fully Secure ID-Based Signature Scheme with Continuous Leakage ResilienceSecurity and Communication Networks10.1155/2022/82202592022Online publication date: 24-Jan-2022
  • (2022)Nearly Optimal Pseudorandomness from HardnessJournal of the ACM10.1145/355530769:6(1-55)Online publication date: 17-Nov-2022
  • (2021)The Mother of All Leakages: How to Simulate Noisy Leakages via Bounded Leakage (Almost) for FreeAdvances in Cryptology – EUROCRYPT 202110.1007/978-3-030-77886-6_14(408-437)Online publication date: 17-Oct-2021
  • (2020)A Group Identification Protocol with Leakage Resilience of Secret Sharing SchemeComplexity10.1155/2020/17842762020Online publication date: 13-Mar-2020
  • (2019)A survey of leakage-resilient cryptographyProviding Sound Foundations for Cryptography10.1145/3335741.3335768(727-794)Online publication date: 4-Oct-2019
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media