Protecting Cryptographic Keys against Continual Leakage

被引:0
|
作者
Juma, Ali [1 ]
Vahlis, Yevgeniy [1 ]
机构
[1] Univ Toronto, Dept Comp Sci, Toronto, ON M5S 1A1, Canada
来源
关键词
FULLY HOMOMORPHIC ENCRYPTION; RESILIENT; CIRCUITS; SCHEMES;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Side-channel attacks have often proven to have a devastating effect on the security of cryptographic schemes. In this paper, we address the problem of storing cryptographic keys and computing on them in a manner that preserves security even when the adversary is able to obtain information leakage during the computation on the key. Using any fully homomorphic encryption with re-randomizable cipher-texts, we show how to encapsulate a key and repeatedly evaluate arbitrary functions on it so that no adversary can gain any useful information from a large class of side-channel attacks. We work in the model of Micali and Reyzin, assuming that only the active part of memory during computation leaks information. Our construction makes use of a single "leak-free" hardware token that samples from a distribution that does not depend on the protected key or the function that is evaluated on it. Our construction is the first general compiler to achieve resilience against polytime leakage functions without performing any leak-free computation on the protected key. Furthermore, the amount of computation our construction must perform does not grow with the amount of leakage the adversary is able to obtain; instead, it suffices to make a stronger assumption about the security of the fully homomorphic encryption.
引用
收藏
页码:41 / 58
页数:18
相关论文
共 50 条
  • [21] Securing Cryptographic Keys in the Cloud: A Survey
    AlBelooshi, Bushra
    Damiani, Ernesto
    Salah, Khaled
    Martin, Thomas
    IEEE CLOUD COMPUTING, 2016, 3 (04): : 42 - +
  • [22] Security of biased sources for cryptographic keys
    Mihailescu, P
    CRYPTOGRAPHY AND COMPUTATIONAL NUMBER THEORY, 2001, 20 : 287 - 302
  • [23] PGP cryptographic keys and key rings
    Crainicu, Bogdan
    Marusteri, Marius
    5th RoEduNet IEEE International Conference, Proceedings, 2006, : 138 - 141
  • [24] A countermeasure against cryptographic key leakage in cloud: public-key encryption with continuous leakage and tampering resilience
    Chengyu Hu
    Rupeng Yang
    Pengtao Liu
    Tong Li
    Fanyu Kong
    The Journal of Supercomputing, 2019, 75 : 3099 - 3122
  • [25] A countermeasure against cryptographic key leakage in cloud: public-key encryption with continuous leakage and tampering resilience
    Hu, Chengyu
    Yang, Rupeng
    Liu, Pengtao
    Li, Tong
    Kong, Fanyu
    JOURNAL OF SUPERCOMPUTING, 2019, 75 (06): : 3099 - 3122
  • [26] Leakage Quantification of Cryptographic Operations
    Wibmer, Michael
    Biswas, Debmalya
    Kerschbaum, Florian
    ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS: OTM 2010, PT I, 2010, 6426 : 685 - +
  • [27] Protecting Cryptographic Libraries Against Side-Channel and Code-Reuse Attacks
    Tsoupidi, Rodothea Myrsini
    Troubitsyna, Elena
    Papadimitratos, Panos
    IEEE SECURITY & PRIVACY, 2024,
  • [28] A Masked White-Box Cryptographic Implementation for Protecting Against Differential Computation Analysis
    Lee, Seungkwang
    Kim, Taesung
    Kang, Yousung
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (10) : 2602 - 2615
  • [29] Binding Cryptographic Keys into Biometric Data: Optimization
    E. T. Zainulina
    I. A. Matveev
    Journal of Computer and Systems Sciences International, 2020, 59 : 699 - 711
  • [30] Embedding renewable cryptographic keys into noisy data
    Ileana Buhan
    Jeroen Doumen
    Pieter Hartel
    Qian Tang
    Raymond Veldhuis
    International Journal of Information Security, 2010, 9 : 193 - 208