2009
DOI: 10.1007/978-3-642-03356-8_3
|View full text |Cite
|
Sign up to set email alerts
|

Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model

Abstract: We study the design of cryptographic primitives resilient to key-leakage attacks, where an attacker can repeatedly and adaptively learn information about the secret key, subject only to the constraint that the overall amount of such information is bounded by some parameter . We construct a variety of leakage-resilient public-key systems including the first known identification schemes (ID), signature schemes and authenticated key agreement protocols (AKA). Our main result is an efficient three-round leakage-re… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

3
268
0

Year Published

2010
2010
2020
2020

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 218 publications
(271 citation statements)
references
References 36 publications
3
268
0
Order By: Relevance
“…The name serves as an analogy to the Bounded Storage Model (BSM) of [Mau92], which restricts the amount of data that an adversary can store after observing a huge public random string, rather than the amount of data an adversary can retrieve from a huge secret key. With the exception of [ADW09], all of the work on the BRM is in the symmetric-key setting, where two parties share a huge secret key. The recent work of Alwen et al [ADW09] gave the first public-key results in the BRM, by constructing identification schemes, (variants of) signatures, and authenticated-key-agreement protocols.…”
Section: Brm the Bounded-retrieval Model Was (Concurrently) Proposedmentioning
confidence: 99%
See 3 more Smart Citations
“…The name serves as an analogy to the Bounded Storage Model (BSM) of [Mau92], which restricts the amount of data that an adversary can store after observing a huge public random string, rather than the amount of data an adversary can retrieve from a huge secret key. With the exception of [ADW09], all of the work on the BRM is in the symmetric-key setting, where two parties share a huge secret key. The recent work of Alwen et al [ADW09] gave the first public-key results in the BRM, by constructing identification schemes, (variants of) signatures, and authenticated-key-agreement protocols.…”
Section: Brm the Bounded-retrieval Model Was (Concurrently) Proposedmentioning
confidence: 99%
“…With the exception of [ADW09], all of the work on the BRM is in the symmetric-key setting, where two parties share a huge secret key. The recent work of Alwen et al [ADW09] gave the first public-key results in the BRM, by constructing identification schemes, (variants of) signatures, and authenticated-key-agreement protocols. However, these primitives cannot be used to encrypt a message non-interactively, as is done in the current work.…”
Section: Brm the Bounded-retrieval Model Was (Concurrently) Proposedmentioning
confidence: 99%
See 2 more Smart Citations
“…Which means that designing algorithms such that their description already provides security against those attacks. Leakage-resilient cryptography is an increasingly active area in recent years and many leakage models have been proposed, such as only computation leaks information (OCLI) [19,21,27, 24], memory leakage [1,17], bounded retrieval [2,3,14], and auxiliary input models [15,21,20,34], etc. In this work, we design leakage-resilient signature schemes based on the following two leakage models:…”
Section: Introductionmentioning
confidence: 99%