期刊论文详细信息
Journal of mathematical cryptology
New approach to practical leakage-resilient public-key cryptography
article
Suvradip Chakraborty1  Janaka Alawatugoda2  Chandrasekaran Pandu Rangan1 
[1] Department of Computer Science and Engineering, Indian Institute of Technology Madras;Department of Computer Science and Engineering, University of Peradeniya
关键词: Leakage-resilient cryptography;    public-key cryptography;    non-interactive key exchange;    authenticated key exchange;    low-latency key exchange;   
DOI  :  10.1515/jmc-2019-0014
学科分类:社会科学、人文和艺术(综合)
来源: De Gruyter
PDF
【 摘 要 】

We present a new approach to construct several leakage-resilient cryptographic primitives, including leakage-resilient public-key encryption (PKE) schemes, authenticated key exchange (AKE) protocols and low-latency key exchange (LLKE) protocols. To this end, we introduce a new primitive called leakage-resilient non-interactive key exchange (LR-NIKE) protocol. We introduce an appropriate security model for LR-NIKE protocols in the bounded memory leakage (BML) settings. We then show a secure construction of the LR-NIKE protocol in the BML setting that achieves an optimal leakage rate, i.e., 1 – o (1). Our construction of LR-NIKE requires a minimal use of a leak-free hardware component. We argue that the use of such a leak-free hardware component seems to be unavoidable in any construction of an LR-NIKE protocol, even in the BML setting. Finally, we show how to construct the aforementioned leakage-resilient primitives from such an LR-NIKE protocol as summarized below. All these primitives also achieve the same (optimal) leakage rate as the underlying LR-NIKE protocol. We show how to construct a leakage-resilient (LR) IND-CCA-2-secure PKE scheme in the BML model generically from a bounded LR-NIKE (BLR-NIKE) protocol. Our construction of LR-IND-CCA-2 secure PKE differs significantly from the state-of-the-art constructions of these primitives, which mainly use hash proof techniques to achieve leakage resilience. Moreover, our transformation preserves the leakage-rate of the underlying BLR-NIKE protocol. We introduce a new leakage model for AKE protocols, in the BML setting, and present a leakage-resilient AKE protocol construction from the LR-NIKE protocol. We introduce the first-ever leakage model for LLKE protocols in the BML setting and the first construction of such a leakage-resilient LLKE from the LR-NIKE protocol.

【 授权许可】

CC BY|CC BY-NC-ND   

【 预 览 】
附件列表
Files Size Format View
RO202107200005211ZK.pdf 956KB PDF download
  文献评价指标  
  下载次数:7次 浏览次数:0次