2010
DOI: 10.1007/978-3-642-13190-5_6
|View full text |Cite
|
Sign up to set email alerts
|

Public-Key Encryption in the Bounded-Retrieval Model

Abstract: Abstract.We construct the first public-key encryption scheme in the Bounded-Retrieval Model (BRM), providing security against various forms of adversarial "key leakage" attacks. In this model, the adversary is allowed to learn arbitrary information about the decryption key, subject only to the constraint that the overall amount of "leakage" is bounded by at most bits. The goal of the BRM is to design cryptographic schemes that can flexibly tolerate arbitrarily leakage bounds (few bits or many Gigabytes), by on… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

1
212
0

Year Published

2012
2012
2018
2018

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 157 publications
(213 citation statements)
references
References 32 publications
1
212
0
Order By: Relevance
“…The model is described in, for example, the works [15,16]. Since an adversary can choose its leakage function after seeing the public key(s), in effect we consider functions that leak on the public and secret keys together.…”
Section: Adaptive Leakage On Leveled Fhementioning
confidence: 99%
See 2 more Smart Citations
“…The model is described in, for example, the works [15,16]. Since an adversary can choose its leakage function after seeing the public key(s), in effect we consider functions that leak on the public and secret keys together.…”
Section: Adaptive Leakage On Leveled Fhementioning
confidence: 99%
“…Since an adversary can choose its leakage function after seeing the public key(s), in effect we consider functions that leak on the public and secret keys together. This framework has been previously considered for non-homomorphic public key and identity based encryption schemes based on bilinear groups, lattices, and quadratic residuosity [16,26,29]. Additionally, both RPKE and "dual Regev", schemes based on DLWE, can be made leakage resilient; Akavia, Goldwasser, and Vaikunatanathan achieve adaptive leakageresilient RPKE [15], and Dodis, Goldwasser, Kalai, Peikert, and Vaikuntanathan construct leakage-resilient "dual Regev" [19].…”
Section: Adaptive Leakage On Leveled Fhementioning
confidence: 99%
See 1 more Smart Citation
“…Which means that designing algorithms such that their description already provides security against those attacks. Leakage-resilient cryptography is an increasingly active area in recent years and many leakage models have been proposed, such as only computation leaks information (OCLI) [19,21,27, 24], memory leakage [1,17], bounded retrieval [2,3,14], and auxiliary input models [15,21,20,34], etc. In this work, we design leakage-resilient signature schemes based on the following two leakage models:…”
Section: Introductionmentioning
confidence: 99%
“…To sum up these two models, l is defined as a fraction of the key (either in terms of the bit size or the entropy). The bounded retrieval model (e.g., see [2,8]), on the other hand, treats the leakage l as a system parameter. The size of the secret key can be increased to allow l bits of leakage, without affecting the public key size, communication and computation efficiency.…”
Section: Introductionmentioning
confidence: 99%