Leakage-Resilient Zero Knowledge

被引:0
|
作者
Garg, Sanjam [1 ]
Jain, Abhishek [1 ]
Sahai, Amit [1 ]
机构
[1] Univ Calif Los Angeles, Los Angeles, CA 90024 USA
来源
关键词
COMPOSABLE MULTIPARTY COMPUTATION; PUBLIC-KEY CRYPTOGRAPHY; PRIVATE CIRCUITS; PROOFS; ENCRYPTION; HARDWARE; SCHEMES;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, we initiate a study of zero knowledge proof systems in the presence of side-channel attacks. Specifically, we consider a setting where a cheating verifier is allowed to obtain arbitrary bounded leakage on the entire state (including the witness and the random coins) of the prover during the entire protocol execution. We formalize a meaningful definition of leakage-resilient zero knowledge (LR-ZK) proof system, that intuitively guarantees that the protocol does not yield anything beyond the validity of the statement and the leakage obtained by the verifier. We give a construction of LR-ZK interactive proof system based on standard general assumptions. To the best of our knowledge, this is the first instance of a cryptographic interactive protocol where the adversary is allowed to perform leakage attacks during the protocol execution on the entire state of honest party (in contrast, prior work only considered leakage prior to the protocol execution, or very limited leakage during the protocol execution). Next, we give an LR-NIZK proof system based on standard number-theoretic assumptions. Finally, we demonstrate the usefulness of our notions by giving two concrete applications: - We initiate a new line of research to relax the assumption on the "tamper-proofness" of hardware tokens used in the design of various cryptographic protocols. In particular, we give a construction of a universally composable multiparty computation protocol in the leaky token model (where an adversary in possession of a token is allowed to obtain arbitrary bounded leakage on the entire state of the token) based on standard general assumptions. - Next, we give simple, generic constructions of fully leakage-resilient signatures in the bounded leakage model as well as the continual leakage model. Unlike the recent constructions of such schemes, we also obtain security in the "noisy leakage" model.
引用
收藏
页码:297 / 315
页数:19
相关论文
共 50 条
  • [41] Leakage-Resilient Layout Randomization for Mobile Devices
    Braden, Kjell
    Crane, Stephen
    Davi, Lucas
    Franz, Michael
    Larsen, Per
    Liebchen, Christopher
    Sadeghi, Ahmad-Reza
    23RD ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2016), 2016,
  • [42] Leakage-resilient group signature: Definitions and constructions
    Huang, Jianye
    Huang, Qiong
    Susilo, Willy
    INFORMATION SCIENCES, 2020, 509 : 119 - 132
  • [43] Leakage-Resilient Storage Scheme for Cryptographic Applications
    Alawatugoda, Janaka
    Ragel, Roshan
    Eranga, Danushka
    Jayanath, Nalaka
    Somathilaka, Chinthaka
    2016 IEEE INTERNATIONAL CONFERENCE ON INFORMATION AND AUTOMATION FOR SUSTAINABILITY (ICIAFS): INTEROPERABLE SUSTAINABLE SMART SYSTEMS FOR NEXT GENERATION, 2016,
  • [44] Strongly Leakage-Resilient Authenticated Key Exchange
    Chen, Rongmao
    Mu, Yi
    Yang, Guomin
    Susilo, Willy
    Guo, Fuchun
    TOPICS IN CRYPTOLOGY - CT-RSA 2016, 2016, 9610 : 19 - 36
  • [45] Memory leakage-resilient secret sharing schemes
    DAI ShuGuang
    WEI JinFeng
    ZHANG FangGuo
    ScienceChina(InformationSciences), 2015, 58 (11) : 191 - 199
  • [46] A Note on Leakage-Resilient Authenticated Key Exchange
    Chun, Ji Young
    Hwang, Jung Yeon
    Lee, Dong Hoon
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2009, 8 (05) : 2274 - 2279
  • [47] Leakage-Resilient Dual-Form Signatures
    Huang, Jianye
    Huang, Qiong
    Susilo, Willy
    COMPUTER JOURNAL, 2018, 61 (08): : 1216 - 1227
  • [48] Leakage-resilient certificate-based encryption
    Yu, Qihong
    Li, Jiguo
    Zhang, Yichen
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 3346 - 3355
  • [49] Leakage-resilient group signature: Definitions and constructions
    Huang, Jianye
    Huang, Qiong
    Susilo, Willy
    Information Sciences, 2020, 509 : 119 - 132
  • [50] Memory leakage-resilient secret sharing schemes
    Dai ShuGuang
    Wei JinFeng
    Zhang FangGuo
    SCIENCE CHINA-INFORMATION SCIENCES, 2015, 58 (11) : 1 - 9