2014
DOI: 10.1007/978-3-642-54242-8_23
|View full text |Cite
|
Sign up to set email alerts
|

Securing Circuits and Protocols against 1/poly(k) Tampering Rate

Abstract: In this work we present an efficient compiler that converts any circuit C into one that is resilient to tampering with 1/ poly(k) fraction of the wires, where k is a security parameter independent of the size of the original circuit |C|. Our tampering model is similar to the one proposed by Ishai et al. (Eurocrypt, 2006) where a tampering adversary may tamper with any wire in the circuit (as long as the overall number of tampered wires is bounded), by setting it to 0 or 1, or by toggling with it. Our result … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 11 publications
(2 citation statements)
references
References 51 publications
0
2
0
Order By: Relevance
“…The work of Liu and Lysyanskaya [29] considered the question of protecting circuits against leakage and tampering in the split-state model, where the leakage and tampering functions are not allowed to operate on the entire circuit at once but only on different parts of it. Ishai et al [22], as well Dachman-Soled and Tauman-Kalai [8,9], considered a reactive setting where in each clock cycle, the circuit produces outputs as well as updates its internal state. In their model, no part of the circuit must be free from tampering, but the adversary is restricted to tampering with a bounded number of wires in each clock cycle.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The work of Liu and Lysyanskaya [29] considered the question of protecting circuits against leakage and tampering in the split-state model, where the leakage and tampering functions are not allowed to operate on the entire circuit at once but only on different parts of it. Ishai et al [22], as well Dachman-Soled and Tauman-Kalai [8,9], considered a reactive setting where in each clock cycle, the circuit produces outputs as well as updates its internal state. In their model, no part of the circuit must be free from tampering, but the adversary is restricted to tampering with a bounded number of wires in each clock cycle.…”
Section: Related Workmentioning
confidence: 99%
“…Subsequent works of Dobrushin and Ortyukov [12] and Pippenger [31] showed how to construct fault-tolerant circuits in this model with only a logarithmic overhead in the worst case and a constant overhead in the typical case. Other models for fault-tolerant circuits, protecting against a bounded number of adversarial faults, were studied in [28,14,15,22,13,29,8,25,9].…”
Section: Overviewmentioning
confidence: 99%