Paper 2010/278
Overcoming the Hole In The Bucket: Public-Key Cryptography Resilient to Continual Memory Leakage
Zvika Brakerski, Yael Tauman Kalai, Jonathan Katz, and Vinod Vaikuntanathan
Abstract
In recent years, there has been a major effort to design cryptographic schemes
that remain secure even if part of the secret key is leaked. This is due to a
recent proliferation of side channel attacks which, through various physical
means, can recover part of the secret key. We explore the possibility of
achieving security even with continual leakage, i.e., even if some information
is leaked each time the key is used.
We show how to securely update a secret key while information is leaked: We
construct schemes that remain secure even if an attacker, {\em at each time
period}, can probe the entire memory (containing a secret key) and ``leak'' up
to a
Note: Title change (previous: "Cryptography Resilient to Continual Memory Leakage").
Metadata
- Available format(s)
-
PDF
- Category
- Public-key cryptography
- Publication info
- Published elsewhere. FOCS 2010
- Keywords
- public key encryptioncontinual memory leakage
- Contact author(s)
- zvika brakerski @ weizmann ac il
- History
- 2010-11-16: revised
- 2010-05-12: received
- See all versions
- Short URL
- https://ia.cr/2010/278
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2010/278, author = {Zvika Brakerski and Yael Tauman Kalai and Jonathan Katz and Vinod Vaikuntanathan}, title = {Overcoming the Hole In The Bucket: Public-Key Cryptography Resilient to Continual Memory Leakage}, howpublished = {Cryptology {ePrint} Archive, Paper 2010/278}, year = {2010}, url = {https://eprint.iacr.org/2010/278} }