Paper 2025/447
Protecting Computations Against Continuous Bounded-Communication Leakage
Abstract
We consider the question of protecting a general computation device, modeled by a stateful Boolean circuit, against leakage of partial information about its internal wires. Goyal et al. (FOCS 2016) obtained a solution for the case of bounded-communication leakage, where the wires are partitioned into two parts and the leakage can be any function computed using
Metadata
- Available format(s)
-
PDF
- Category
- Foundations
- Publication info
- Published elsewhere. Major revision. STOC 2025
- Keywords
- Leakage Resilience
- Contact author(s)
-
yuvali @ cs technion ac il
yfsong @ mail tsinghua edu cn - History
- 2025-04-01: last of 2 revisions
- 2025-03-09: received
- See all versions
- Short URL
- https://ia.cr/2025/447
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2025/447, author = {Yuval Ishai and Yifan Song}, title = {Protecting Computations Against Continuous Bounded-Communication Leakage}, howpublished = {Cryptology {ePrint} Archive, Paper 2025/447}, year = {2025}, url = {https://eprint.iacr.org/2025/447} }