Paper 2017/441

New Approach to Practical Leakage-Resilient Public-Key Cryptography

Suvradip Chakraborty, Janaka Alawatugoda, and C. Pandu Rangan

Abstract

We present a new approach to construct several leakage-resilient cryptographic primitives, including leakage-resilient public-key encryption (PKE) schemes, authenticated key exchange (AKE) protocols and low-latency key exchange (LLKE) protocols. To this end, we introduce a new primitive called leakage-resilient non-interactive key exchange (LR-NIKE) protocol. We introduce a generic security model for LR-NIKE protocols, which can be instantiated in both the bounded and continuous-memory leakage ((B/C)-ML) settings. We then show a secure construction of LR-NIKE protocol in the bounded- memory leakage (BML) setting, that achieves an optimal leakage rate, i.e., 1-o(1). Finally, we show how to construct the aforementioned leakage-resilient primitives from such a LR-NIKE protocol as summarized below. All the primitives also achieve the same (optimal) leakage rate as the underlying LR-NIKE protocol. We show how to construct a leakage-resilient IND-CCA-2-secure PKE scheme in the BML model generically from a LR-NIKE protocol. Our construction differs from the state-of-the-art constructions of leakage-resilient IND-CCA-2-secure PKE schemes, which use hash proof techniques to achieve leakage-resilience. Moreover, our transformation preserves the leakage-rate of the underlying LR- NIKE and admits more efficient construction than previous such PKE constructions. We introduce a new leakage model for AKE protocols, in the BML setting. We show how to construct a leakage-resilient AKE protocol starting from LR-NIKE protocol. We introduce the first-ever leakage model for LLKE protocols in the BML setting, and the first construction of such a leakage-resilient LLKE from LR-NIKE protocol.

Metadata
Available format(s)
PDF
Publication info
Preprint. MINOR revision.
Keywords
leakage-resilient cryptographybounded-leakagenon-interactive key exchangekey exchange protocolslow-latency key exchange
Contact author(s)
araliyaqut @ gmail com
History
2017-10-10: last of 9 revisions
2017-05-23: received
See all versions
Short URL
https://ia.cr/2017/441
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2017/441,
      author = {Suvradip Chakraborty and Janaka Alawatugoda and C.  Pandu Rangan},
      title = {New Approach to Practical Leakage-Resilient Public-Key Cryptography},
      howpublished = {Cryptology ePrint Archive, Paper 2017/441},
      year = {2017},
      note = {\url{https://eprint.iacr.org/2017/441}},
      url = {https://eprint.iacr.org/2017/441}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.