Show simple item record

dc.contributor.authorGoldwasser, Shafi
dc.contributor.authorRothblum, Guy N.
dc.date.accessioned2012-10-15T14:27:07Z
dc.date.available2012-10-15T14:27:07Z
dc.date.issued2010-08
dc.date.submitted2010-08
dc.identifier.isbn978-3-642-14622-0
dc.identifier.issn0302-9743
dc.identifier.issn1611-3349
dc.identifier.urihttp://hdl.handle.net/1721.1/73956
dc.description30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedingsen_US
dc.description.abstractWe present a general method to compile any cryptographic algorithm into one which resists side channel attacks of the only computation leaks information variety for an unbounded number of executions. Our method uses as a building block a semantically secure subsidiary bit encryption scheme with the following additional operations: key refreshing, oblivious generation of cipher texts, leakage resilience re-generation, and blinded homomorphic evaluation of one single complete gate (e.g. NAND). Furthermore, the security properties of the subsidiary encryption scheme should withstand bounded leakage incurred while performing each of the above operations. We show how to implement such a subsidiary encryption scheme under the DDH intractability assumption and the existence of a simple secure hardware component. The hardware component is independent of the encryption scheme secret key. The subsidiary encryption scheme resists leakage attacks where the leakage is computable in polynomial time and of length bounded by a constant fraction of the security parameter.en_US
dc.description.sponsorshipIsrael Science Foundation (710267)en_US
dc.description.sponsorshipUnited States-Israel Binational Science Foundation (710613)en_US
dc.description.sponsorshipNational Science Foundation (U.S.) (6914349)en_US
dc.description.sponsorshipWeizmann KAMAR Granten_US
dc.language.isoen_US
dc.publisherSpringer Berlin / Heidelbergen_US
dc.relation.isversionofhttp://dx.doi.org/10.1007/978-3-642-14623-7_4en_US
dc.rightsCreative Commons Attribution-Noncommercial-Share Alike 3.0en_US
dc.rights.urihttp://creativecommons.org/licenses/by-nc-sa/3.0/en_US
dc.sourceMIT web domainen_US
dc.titleSecuring computation against continuous leakageen_US
dc.typeArticleen_US
dc.identifier.citationGoldwasser, Shafi, and Guy N. Rothblum. “Securing Computation Against Continuous Leakage.” Advances in Cryptology – CRYPTO 2010. Ed. Tal Rabin. LNCS Vol. 6223. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. 59–79.en_US
dc.contributor.departmentMassachusetts Institute of Technology. Department of Electrical Engineering and Computer Scienceen_US
dc.contributor.mitauthorGoldwasser, Shafi
dc.relation.journalAdvances in Cryptology – CRYPTO 2010en_US
dc.eprint.versionAuthor's final manuscripten_US
dc.type.urihttp://purl.org/eprint/type/ConferencePaperen_US
dspace.orderedauthorsGoldwasser, Shafi; Rothblum, Guy N.en
dc.identifier.orcidhttps://orcid.org/0000-0003-4728-1535
mit.licenseOPEN_ACCESS_POLICYen_US
mit.metadata.statusComplete


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record