Paper 2023/410
Unbounded Leakage-Resilience and Intrusion-Detection in a Quantum World
Abstract
Can an adversary hack into our computer and steal sensitive data such as cryptographic keys? This question is almost as old as the Internet and significant effort has been spent on designing mechanisms to prevent and detect hacking attacks. Once quantum computers arrive, will the situation remain the same or can we hope to live in a better world?
We first consider ubiquitous side-channel attacks, which aim to leak side information on secret system components, studied in the leakage-resilient cryptography literature. Classical leakage-resilient cryptography must necessarily impose restrictions on the type of leakage one aims to protect against. As a notable example, the most well-studied leakage model is that of bounded leakage, where it is assumed that an adversary learns at most
Note: Major revision
Metadata
- Available format(s)
-
PDF
- Category
- Foundations
- Publication info
- Preprint.
- Keywords
- quantum cryptographyleakage-resilient cryptography
- Contact author(s)
-
acakan @ andrew cmu edu
vipul @ cmu edu
chen-da liuzhang @ ntt-research com
joao ribeiro @ fct unl pt - History
- 2023-10-24: revised
- 2023-03-21: received
- See all versions
- Short URL
- https://ia.cr/2023/410
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2023/410, author = {Alper Cakan and Vipul Goyal and Chen-Da Liu-Zhang and João Ribeiro}, title = {Unbounded Leakage-Resilience and Intrusion-Detection in a Quantum World}, howpublished = {Cryptology {ePrint} Archive, Paper 2023/410}, year = {2023}, url = {https://eprint.iacr.org/2023/410} }