• DocumentCode
    1709253
  • Title

    Overcoming the Hole in the Bucket: Public-Key Cryptography Resilient to Continual Memory Leakage

  • Author

    Brakerski, Zvika ; Kalai, Yael Tauman ; Katz, Jonathan ; Vaikuntanathan, Vinod

  • fYear
    2010
  • Firstpage
    501
  • Lastpage
    510
  • Abstract
    In recent years, there has been a major effort to design cryptographic schemes that remain secure even when arbitrary information about the secret key is leaked (e.g., via side-channel attacks). We explore the possibility of achieving security under emph{continual} leakage from the emph{entire} secret key by designing schemes in which the secret key is updated over time. In this model, we construct public-key encryption schemes, digital signatures, and identity-based encryption schemes that remain secure even if an attacker can leak a constant fraction of the secret memory (including the secret key) in each time period between key updates. We also consider attackers who may probe the secret memory during the updates themselves. We stress that we allow unrestricted leakage, without the assumption that ``only computation leaks information´´. Prior to this work, constructions of public-key encryption schemes secure under continual leakage were not known even under this assumption.
  • Keywords
    digital signatures; public key cryptography; continual memory leakage; cryptographic schemes; digital signatures; identity-based encryption schemes; public-key cryptography; public-key encryption schemes; secret key; Computational modeling; Encryption; Identity-based encryption; Resilience;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Foundations of Computer Science (FOCS), 2010 51st Annual IEEE Symposium on
  • Conference_Location
    Las Vegas, NV
  • ISSN
    0272-5428
  • Print_ISBN
    978-1-4244-8525-3
  • Type

    conf

  • DOI
    10.1109/FOCS.2010.55
  • Filename
    5671245