Protecting Cryptographic Keys against Continual Leakage

被引:0
|
作者
Juma, Ali [1 ]
Vahlis, Yevgeniy [1 ]
机构
[1] Univ Toronto, Dept Comp Sci, Toronto, ON M5S 1A1, Canada
来源
关键词
FULLY HOMOMORPHIC ENCRYPTION; RESILIENT; CIRCUITS; SCHEMES;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Side-channel attacks have often proven to have a devastating effect on the security of cryptographic schemes. In this paper, we address the problem of storing cryptographic keys and computing on them in a manner that preserves security even when the adversary is able to obtain information leakage during the computation on the key. Using any fully homomorphic encryption with re-randomizable cipher-texts, we show how to encapsulate a key and repeatedly evaluate arbitrary functions on it so that no adversary can gain any useful information from a large class of side-channel attacks. We work in the model of Micali and Reyzin, assuming that only the active part of memory during computation leaks information. Our construction makes use of a single "leak-free" hardware token that samples from a distribution that does not depend on the protected key or the function that is evaluated on it. Our construction is the first general compiler to achieve resilience against polytime leakage functions without performing any leak-free computation on the protected key. Furthermore, the amount of computation our construction must perform does not grow with the amount of leakage the adversary is able to obtain; instead, it suffices to make a stronger assumption about the security of the fully homomorphic encryption.
引用
收藏
页码:41 / 58
页数:18
相关论文
共 50 条
  • [31] Deriving cryptographic keys from physiological signals
    Altop, Duygu Karaoglan
    Levi, Albert
    Tuzcu, Volkan
    PERVASIVE AND MOBILE COMPUTING, 2017, 39 : 65 - 79
  • [32] The Use of Genetic Algorithms for Cryptographic Keys Generation
    Turčaník M.
    Javurek M.
    Studies in Big Data, 2021, 84 : 315 - 324
  • [33] Protecting Distributed Primitives Against Leakage: Equivocal Secret Sharing and more
    Hazay, Carmit
    Venkitasubramaniam, Muthuramakrishnan
    Weiss, Mor
    JOURNAL OF CRYPTOLOGY, 2025, 38 (01)
  • [34] On the distribution and revocation of cryptographic keys in sensor networks
    Chan, HW
    Gligor, VD
    Perrig, A
    Muralidharan, G
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2005, 2 (03) : 233 - 247
  • [35] Embedding renewable cryptographic keys into noisy data
    Buhan, Ileana
    Doumen, Jeroen
    Hartel, Pieter
    Tang, Qian
    Veldhuis, Raymond
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2010, 9 (03) : 193 - 208
  • [36] Practical Network Encryption with Quantum Cryptographic Keys
    Jain, Nitin
    Bidstrup, Erik
    Chin, Hou-Man
    Mani, Hossein
    Hajomer, Adnan A. E.
    Andersen, Ulrik L.
    Gehring, Tobias
    2022 EUROPEAN CONFERENCE ON OPTICAL COMMUNICATION (ECOC), 2022,
  • [37] Parameter Control in Predistribution Schemes of Cryptographic Keys
    Zhao, Jun
    2015 IEEE GLOBAL CONFERENCE ON SIGNAL AND INFORMATION PROCESSING (GLOBALSIP), 2015, : 863 - 867
  • [38] Computation of cryptographic keys from face biometrics
    Goh, A
    Ngo, DCL
    COMMUNICATIONS AND MULTIMEDIA SECURITY, 2003, 2828 : 1 - 13
  • [39] Distribution of cryptographic keys in systems with a hierarchy of objects
    Belim S.V.
    Bogachenko N.F.
    Automatic Control and Computer Sciences, 2016, 50 (08) : 777 - 786
  • [40] Securing Cryptographic Keys in the IaaS Cloud Model
    AlBelooshi, B.
    Salah, K.
    Martin, T.
    Damiani, E.
    2015 IEEE/ACM 8TH INTERNATIONAL CONFERENCE ON UTILITY AND CLOUD COMPUTING (UCC), 2015, : 397 - 401