You are looking at a specific version 20170611:054842 of this paper. See the latest version.

Paper 2017/441

New Approach to Practical Leakage-Resilient Public-Key Cryptography

Suvradip Chakraborty and Janaka Alawatugoda and C. Pandu Rangan

Abstract

We present a new approach to construct several leakage-resilient cryptographic primitives, including public-key encryption (PKE) schemes, authenticated key exchange (AKE) protocols and low-latency key exchange (LLKE) protocols. To this end, we develop a new primitive called \emph{leakage-resilient non-interactive key exchange} (LR-NIKE). We introduce a new generic security model for LR-NIKE protocols, which can be instantiated in both bounded-and-continuous-memory leakage setting. We then show a secure construction of LR-NIKE protocol in the bounded-memory leakage setting, that achieves an optimal leakage rate, i.e., $1- o(1)$. We then show how to construct the aforementioned leakage-resilient primitives from such a LR-NIKE. %Our approach not only gives an alternate design strategy of these leakage-resilient primitives, but also admits more efficient constructions than the state-of-the-art construction of some of these primitives, like public-key encryption. In particular, \begin{enumerate} \item[$\bullet$] We show how to construct a leakage-resilient IND-CCA-2-secure PKE scheme in the bounded-memory leakage setting, from LR-NIKE protocol. Our construction differs from the state-of-the-art constructions of leakage-resilient IND-CCA-2-secure PKE, which use hash proof techniques to achieve leakage resiliency. Moreover, our transformation preserves the leakage-rate of the underlying LR-NIKE and admits more efficient construction than the previous such PKE constructions. %\vspace{0.3 mm} \item[$\bullet$] We introduce a new leakage model for AKE protocols, in the bounded-memory leakage setting. We show how to construct a leakage-resilient AKE protocol starting from LR-NIKE protocol. %This gives new constructions of leakage-resilient AKE. %\vspace{0.3 mm} \item[$\bullet$] We introduce the first-ever leakage model for LLKE protocols, in the bounded-memory leakage setting, and the first construction of such a leakage-resilient LLKE from LR-NIKE protocol. %Our work gives the first leakage security model for leakage-resilient LLKE and their construction. \end{enumerate}

Metadata
Available format(s)
PDF
Publication info
Preprint. MINOR revision.
Keywords
leakage-resilientpublic-key encryptionkey exchange protocols
Contact author(s)
araliyaqut @ gmail com
History
2017-10-10: last of 9 revisions
2017-05-23: received
See all versions
Short URL
https://ia.cr/2017/441
License
Creative Commons Attribution
CC BY
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.