Paper 2016/173
Circuit Compilers with O(1/ log(n)) Leakage Rate
Marcin Andrychowicz, Stefan Dziembowski, and Sebastian Faust
Abstract
The goal of leakage-resilient cryptography is to construct cryptographic algorithms that are secure even if the devices on which they are implemented leak information to the adversary. One of the main parameters for designing leakage resilient constructions is the leakage \emph{rate}, i.e., a proportion between the amount of leaked information and the complexity of the computation carried out by the construction. We focus on the so-called circuit compilers, which is an important tool for transforming any cryptographic algorithm (represented as a circuit) into one that is secure against the leakage attack. Our model is the ``probing attack'' where the adversary learns the values on some (chosen by him) wires of the circuit.
Our results can be summarized as follows. First, we construct circuit compilers with perfect security and leakage rate
Metadata
- Available format(s)
-
PDF
- Category
- Foundations
- Publication info
- Published by the IACR in EUROCRYPT 2016
- Keywords
- leakage resiliencemasking
- Contact author(s)
- sebastian faust @ gmail com
- History
- 2016-02-22: received
- Short URL
- https://ia.cr/2016/173
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2016/173, author = {Marcin Andrychowicz and Stefan Dziembowski and Sebastian Faust}, title = {Circuit Compilers with O(1/ log(n)) Leakage Rate}, howpublished = {Cryptology {ePrint} Archive, Paper 2016/173}, year = {2016}, url = {https://eprint.iacr.org/2016/173} }