DocumentCode :
1710857
Title :
Cryptography against Continuous Memory Attacks
Author :
Dodis, Yevgeniy ; Haralambiev, Kristiyan ; López-Alt, Adriana ; Wichs, Daniel
Author_Institution :
New York Univ., New York, NY, USA
fYear :
2010
Firstpage :
511
Lastpage :
520
Abstract :
We say that a cryptographic scheme is Continuous Leakage-Resilient (CLR), if it allows users to refresh their secret keys, using only fresh local randomness, such that: 1. The scheme remains functional after any number of key refreshes, although the public key never changes. Thus, the “outside world´´ is neither affected by these key refreshes, nor needs to know about their frequency. 2. The scheme remains secure even if the adversary can continuously leak arbitrary information about the current secret-key, as long as the amount of leaked information is bounded in between any two successive key refreshes. There is no bound on the total amount of information that can be leaked during the lifetime of the system. In this work, we construct a variety of practical CLR schemes, including CLR one-way relations, CLR signatures, CLR identification schemes, and CLR authenticated key agreement protocols. For each of the above, we give general constructions, and then show how to instantiate them efficiently using a well established assumption on bilinear groups, called the K-Linear assumption (for any constant K greater than or equal to 1). Our constructions are highly modular, and we develop many interesting techniques and building-blocks along the way, including: leakage-indistinguishable re-randomizable relations, homomorphic NIZKs, and leakage-of-cipher text non-malleable encryption schemes.
Keywords :
cryptographic protocols; public key cryptography; CLR authenticated key agreement protocols; CLR identification schemes; CLR signatures; NIZK; continuous leakage resilient cryptographic scheme; continuous memory attacks; k-linear assumption; leakage-of-ciphertext nonmalleable encryption schemes; public key; Context; Encryption; Entropy; Public key; Syntactics; Leakage-Resilient Cryptography; Public-Key Cryptography; Signatures;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Foundations of Computer Science (FOCS), 2010 51st Annual IEEE Symposium on
Conference_Location :
Las Vegas, NV
ISSN :
0272-5428
Print_ISBN :
978-1-4244-8525-3
Type :
conf
DOI :
10.1109/FOCS.2010.56
Filename :
5671302
Link To Document :
بازگشت