Sciweavers

ICITS
2009

Survey: Leakage Resilience and the Bounded Retrieval Model

13 years 10 months ago
Survey: Leakage Resilience and the Bounded Retrieval Model
Abstract. This survey paper studies recent advances in the field of LeakageResilient Cryptography. This booming area is concerned with the design of cryptographic primitives resistant to arbitrary side-channel attacks, where an attacker can repeatedly and adaptively learn information about the secret key, subject only to the constraint that the overall amount of such information is bounded by some parameter . We start by surveying recent results in the so called Relative Leakage Model, where all the parameters of the system are allowed to depend on , and the goal is to make large relative to the length of the secret key. We conclude by showing how to extend the relative leakage results to the Bounded Retrieval Model (aka "Absolute Leakage Model"), where only the secret key length is allowed to be slightly larger than , but all other system parameters (e.g., publickey, communication, etc.) are independent of the absolute value of . Throughout the presentation we will emphasize...
Joël Alwen, Yevgeniy Dodis, Daniel Wichs
Added 19 Feb 2011
Updated 19 Feb 2011
Type Journal
Year 2009
Where ICITS
Authors Joël Alwen, Yevgeniy Dodis, Daniel Wichs
Comments (0)