Multi-location Leakage Resilient Cryptography

被引:0
作者
Juma, Ali [1 ]
Vahlis, Yevgeniy [2 ]
Yung, Moti [3 ,4 ]
机构
[1] Mozilla Corp, Mountain View, CA 94041 USA
[2] AT&T Secur Res Ctr, New York, NY USA
[3] Google, Menlo Pk, CA USA
[4] Columbia Univ, New York, NY 10027 USA
来源
PUBLIC KEY CRYPTOGRAPHY - PKC 2012 | 2012年 / 7293卷
基金
美国国家科学基金会;
关键词
PUBLIC-KEY CRYPTOGRAPHY; PRIVATE CIRCUITS; ENCRYPTION;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Understanding and modeling leakage in the context of cryptographic systems (connecting physical protection of keys and cryptographic operation) is an emerging area with many missing issues and hard to understand aspects. In this work we initiate the study of leakage out of cryptographic devices when the operation is inherently replicated in multiple locations. This setting (allowing the adversary access to leakage at different locations) arises naturally in cases like protocols, where different parties activate the same cryptographic function, or in the case of a global service providers (like cloud operators) which need to replicate the cryptographic function to allow for accessible and responsive services. We specifically deal with the theoretical setting of "leakage resilient cryptography," (modeling leakage as a bound associated with algorithmic steps), and in the most general model of continual leakage on memory, randomness (and thus computation) with periods of operation and refresh of private keys between them. We first investigate public-key cryptography, and construct a multilocation leakage resilient signature scheme (with unbounded number of locations) with optimal (i.e., total n(1-o(1)) leakage) in a period, and O(log n) leakage during updates (n is the key size). The new crucial issue behind our scheme is how to maintain leakage at each location at the level of key leakage in the single location variant, even under parallel adaptive leakage at the different locations. We then construct a shared-symmetric-key authenticated session protocol that is resilient to leakage on both the sender and the receiver, and tolerates O(log n) bits of leakage per computation. We construct and utilize a single-location pseudorandom generator which is the first to tolerate continual leakage with only an efficient pseudorandom function as a primitive component. This protocol highlights the importance of protocol level " per message synchronization" against leakage adversaries. Interestingly, the construction is secure in spite of the entire randomness used in the refresh processes being publicly available.
引用
收藏
页码:504 / 521
页数:18
相关论文
共 39 条
[1]  
Akavik A, 2009, LECT NOTES COMPUT SC, V5444, P474
[2]  
Alwen J, 2010, LECT NOTES COMPUT SC, V6110, P113
[3]  
Alwen J, 2009, LECT NOTES COMPUT SC, V5677, P36, DOI 10.1007/978-3-642-03356-8_3
[4]  
Boyle E, 2011, LECT NOTES COMPUT SC, V6632, P89, DOI 10.1007/978-3-642-20465-4_7
[5]   Overcoming the Hole in the Bucket: Public-Key Cryptography Resilient to Continual Memory Leakage [J].
Brakerski, Zvika ;
Kalai, Yael Tauman ;
Katz, Jonathan ;
Vaikuntanathan, Vinod .
2010 IEEE 51ST ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, 2010, :501-510
[6]  
Choi SG, 2011, LECT NOTES COMPUT SC, V7073, P740, DOI 10.1007/978-3-642-25385-0_40
[7]   Practical Leakage-Resilient Identity-Based Encryption from Simple Assumptions [J].
Chow, Sherman S. M. ;
Dodis, Yevgeniy ;
Rouselakis, Yannis ;
Waters, Brent .
PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, :152-161
[8]  
Dodis Y., 2011, FOCS 2011 IN PRESS
[9]   Efficient Public-Key Cryptography in the Presence of Key Leakage [J].
Dodis, Yevgeniy ;
Haralambiev, Kristiyan ;
Lopez-Alt, Adriana ;
Wichs, Daniel .
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2010, 2010, 6477 :613-631
[10]   Cryptography Against Continuous Memory Attacks [J].
Dodis, Yevgeniy ;
Haralambiev, Kristiyan ;
Lopez-Alt, Adriana ;
Wichs, Daniel .
2010 IEEE 51ST ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, 2010, :511-520