Protecting Cryptographic Keys against Continual Leakage

被引:0
|
作者
Juma, Ali [1 ]
Vahlis, Yevgeniy [1 ]
机构
[1] Univ Toronto, Dept Comp Sci, Toronto, ON M5S 1A1, Canada
来源
关键词
FULLY HOMOMORPHIC ENCRYPTION; RESILIENT; CIRCUITS; SCHEMES;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Side-channel attacks have often proven to have a devastating effect on the security of cryptographic schemes. In this paper, we address the problem of storing cryptographic keys and computing on them in a manner that preserves security even when the adversary is able to obtain information leakage during the computation on the key. Using any fully homomorphic encryption with re-randomizable cipher-texts, we show how to encapsulate a key and repeatedly evaluate arbitrary functions on it so that no adversary can gain any useful information from a large class of side-channel attacks. We work in the model of Micali and Reyzin, assuming that only the active part of memory during computation leaks information. Our construction makes use of a single "leak-free" hardware token that samples from a distribution that does not depend on the protected key or the function that is evaluated on it. Our construction is the first general compiler to achieve resilience against polytime leakage functions without performing any leak-free computation on the protected key. Furthermore, the amount of computation our construction must perform does not grow with the amount of leakage the adversary is able to obtain; instead, it suffices to make a stronger assumption about the security of the fully homomorphic encryption.
引用
收藏
页码:41 / 58
页数:18
相关论文
共 50 条
  • [1] A Scattering Technique for Protecting Cryptographic Keys in the Cloud
    Mohamed, Fatma
    AlBelooshi, Bushra
    Salah, Khaled
    Yeun, Chan Yeob
    Damiani, Ernesto
    2017 IEEE 2ND INTERNATIONAL WORKSHOPS ON FOUNDATIONS AND APPLICATIONS OF SELF* SYSTEMS (FAS*W), 2017, : 301 - 306
  • [2] Protecting cryptographic keys: The trace-and revoke approach
    Naor, D
    Naor, M
    COMPUTER, 2003, 36 (07) : 47 - +
  • [3] Protecting cryptographic keys from memory disclosure attacks
    Harrison, Keith
    Xu, Shouhuai
    37TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2007, : 137 - +
  • [4] Hardware Architecture Implemented on FPGA for Protecting Cryptographic Keys against Side-Channel Attacks
    Lumbiarres-Lopez, Ruben
    Lopez-Garcia, Mariano
    Canto-Navarro, Enrique
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2018, 15 (05) : 898 - 905
  • [5] Protecting against Cryptographic Trojans in FPGAs
    Swierczynski, Pawel
    Fyrbiak, Marc
    Paar, Christof
    Huriaux, Christophe
    Tessier, Russell
    2015 IEEE 23RD ANNUAL INTERNATIONAL SYMPOSIUM ON FIELD-PROGRAMMABLE CUSTOM COMPUTING MACHINES (FCCM), 2015, : 151 - 154
  • [6] Multiparty Computation Secure Against Continual Memory Leakage
    Boyle, Elette
    Goldwasser, Shafi
    Jain, Abhishek
    Kalai, Yael Tauman
    STOC'12: PROCEEDINGS OF THE 2012 ACM SYMPOSIUM ON THEORY OF COMPUTING, 2012, : 1235 - 1254
  • [7] On Compression of Cryptographic Keys
    Chan, Aldar C-F.
    2008 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS, VOLS 1-6, 2008, : 1853 - 1857
  • [8] PROTECTING PUBLIC KEYS AND SIGNATURE KEYS
    DENNING, DE
    COMPUTER, 1983, 16 (02) : 27 - 35
  • [9] Keeping cryptographic keys safe
    Gregory S. Kanter
    Prem Kumar
    Nature Photonics, 2007, 1 : 15 - 16
  • [10] Keeping cryptographic keys safe
    Kanter, Gregory S.
    Kumar, Prem
    NATURE PHOTONICS, 2007, 1 (01) : 15 - 16