2015
DOI: 10.1007/s00145-015-9200-x
|View full text |Cite
|
Sign up to set email alerts
|

Leakage-Resilient Cryptography from Minimal Assumptions

Abstract: We present new constructions of leakage-resilient cryptosystems, which remain provably secure even if the attacker learns some arbitrary partial information about their internal secret key. For any polynomial ℓ, we can instantiate these schemes so as to tolerate up to ℓ bits of leakage. While there has been much prior work constructing such leakage-resilient cryptosystems under concrete number-theoretic and algebraic assumptions, we present the first schemes under general and minimal assumptions. In particular… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
30
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
6
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 22 publications
(30 citation statements)
references
References 45 publications
0
30
0
Order By: Relevance
“…consider only key leakage). In fact, this is also true for public-key encryption schemes: see, e.g., [27] for an early proposal in this direction and [15] for a more recent one. On the one hand, this seems unavoidable: indeed a single bit of leakage on the plaintext trivially breaks the semantic security game.…”
Section: Introductionmentioning
confidence: 92%
“…consider only key leakage). In fact, this is also true for public-key encryption schemes: see, e.g., [27] for an early proposal in this direction and [15] for a more recent one. On the one hand, this seems unavoidable: indeed a single bit of leakage on the plaintext trivially breaks the semantic security game.…”
Section: Introductionmentioning
confidence: 92%
“…In the full version [31], we show how to construct leakage-resilient PKE from wHPS by following the construction of Naor and Segev [43], while formalizing that the the weaker security of wHPS is sufficient. We apply an extractor to the output k of the wHPS, and then use the extracted randomness as a one-time-pad to encrypt a message of our choice.…”
Section: Constructing Lr-pke From Whpsmentioning
confidence: 99%
“…From wPRF to CPA Encryption. In the full version [31] we show how to construct leakage-resilient CPA-secure (LR-CPA) symmetric-key encryption from LR-wPRF.…”
Section: Leakage-resilient Wprf and Symmetric-key Encryption Definingmentioning
confidence: 99%
See 1 more Smart Citation
“…There are also other security models for leakage-resilience that consider more complicated scenarios of key leakage, e.g., auxiliary input model [11], continual-leakage model [5,9] and continual auxiliary input model [33]. Nevertheless, many works from those complicated models rely on the results from the bounded-leakage model as basic building blocks [19]. In this paper, we consider the bounded-leakage model in the setting of public-key encryption.…”
Section: Introductionmentioning
confidence: 99%