Show simple item record

dc.contributor.authorRothblum, Guy N.
dc.contributor.authorGoldwasser, Shafrira
dc.date.accessioned2018-05-17T18:42:43Z
dc.date.available2018-05-17T18:42:43Z
dc.date.issued2015-10
dc.date.submitted2013-08
dc.identifier.issn0097-5397
dc.identifier.issn1095-7111
dc.identifier.urihttp://hdl.handle.net/1721.1/115437
dc.description.abstractWe address the following problem: how to execute any algorithm P, for an unbounded number of executions, in the presence of an adversary who observes partial information on the internal state of the computation during executions. The security guarantee is that the adversary learns nothing, beyond P's input-output behavior. Our main result is a compiler, which takes as input an algorithm P and a security parameter κ and produces a functionally equivalent algorithm P′. The running time of P′ is a factor of poly(κ) slower than P. P′ will be composed of a series of calls to poly(κ)-time computable subalgorithms. During the executions of P′, an adversary algorithm A, which can choose the inputs of P′, can learn the results of adaptively chosen leakage functions-each of bounded output size ∼θ(κ)-on the subalgorithms of P′ and the randomness they use. We prove that any computationally unbounded A observing the results of computationally unbounded leakage functions will learn no more from its observations than it could given black-box access only to the input-output behavior of P. Unlike all prior work on this question, this result does not rely on any secure hardware components and is unconditional. Namely, it holds even if P = NP.en_US
dc.publisherSociety for Industrial & Applied Mathematics (SIAM)en_US
dc.relation.isversionofhttp://dx.doi.org/10.1137/130931461en_US
dc.rightsArticle is made available in accordance with the publisher's policy and may be subject to US copyright law. Please refer to the publisher's site for terms of use.en_US
dc.sourceSIAMen_US
dc.titleHow to Compute in the Presence of Leakageen_US
dc.typeArticleen_US
dc.identifier.citationGoldwasser, Shafi and Guy N. Rothblum. “How to Compute in the Presence of Leakage.” SIAM Journal on Computing 44, 5 (January 2015): 1480–1549 © 2015 Society for Industrial and Applied Mathematicsen_US
dc.contributor.departmentMassachusetts Institute of Technology. Department of Electrical Engineering and Computer Scienceen_US
dc.contributor.mitauthorGoldwasser, Shafrira
dc.relation.journalSIAM Journal on Computingen_US
dc.eprint.versionFinal published versionen_US
dc.type.urihttp://purl.org/eprint/type/JournalArticleen_US
eprint.statushttp://purl.org/eprint/status/PeerRevieweden_US
dc.date.updated2018-05-10T16:35:22Z
dspace.orderedauthorsGoldwasser, Shafi; Rothblum, Guy N.en_US
dspace.embargo.termsNen_US
dc.identifier.orcidhttps://orcid.org/0000-0003-4728-1535
mit.licensePUBLISHER_POLICYen_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record