### Circuit Compilers with O(1/ log(n)) Leakage Rate

Marcin Andrychowicz, Stefan Dziembowski, and Sebastian Faust

##### Abstract

The goal of leakage-resilient cryptography is to construct cryptographic algorithms that are secure even if the devices on which they are implemented leak information to the adversary. One of the main parameters for designing leakage resilient constructions is the leakage \emph{rate}, i.e., a proportion between the amount of leaked information and the complexity of the computation carried out by the construction. We focus on the so-called circuit compilers, which is an important tool for transforming any cryptographic algorithm (represented as a circuit) into one that is secure against the leakage attack. Our model is the probing attack'' where the adversary learns the values on some (chosen by him) wires of the circuit. Our results can be summarized as follows. First, we construct circuit compilers with perfect security and leakage rate $O(1/\log(n))$, where $n$ denotes the security parameter (previously known constructions achieved rate $O(1/n)$). Moreover, for the circuits that have only affine gates we obtain a construction with a constant leakage rate. In particular, our techniques can be used to obtain constant-rate leakage-resilient schemes for refreshing an encoded secret (previously known schemes could tolerate leakage rates $O(1/n)$). We also show that our main construction is secure against constant-rate leakage in the random probing leakage model, where the leaking wires are chosen randomly.

Available format(s)
Category
Foundations
Publication info
Keywords
Contact author(s)
sebastian faust @ gmail com
History
Short URL
https://ia.cr/2016/173

CC BY

BibTeX

@misc{cryptoeprint:2016/173,
author = {Marcin Andrychowicz and Stefan Dziembowski and Sebastian Faust},
title = {Circuit Compilers with O(1/ log(n)) Leakage Rate},
howpublished = {Cryptology ePrint Archive, Paper 2016/173},
year = {2016},
note = {\url{https://eprint.iacr.org/2016/173}},
url = {https://eprint.iacr.org/2016/173}
}

Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.