Abstract
Trusted parties and devices are commonly used in the real world to securely perform computations on secret inputs. However, their security can often be compromised by side-channel attacks in which the adversary obtains partial leakage on intermediate computation values. This gives rise to the following natural question: To what extent can one protect the trusted party against leakage? Our goal is to design a hardware device T that allows m≥ 1 parties to securely evaluate a function f(x1, …, xm) of their inputs by feeding T with encoded inputs that are obtained using local secret randomness. Security should hold even in the presence of an active adversary that can corrupt a subset of parties and obtain restricted leakage on the internal computations in T. We design hardware devices T in this setting both for zero-knowledge proofs and for general multi-party computations. Our constructions can unconditionally resist either AC0 leakage or a strong form of “only computation leaks” (OCL) leakage that captures realistic side-channel attacks, providing different tradeoffs between efficiency and security.
| Original language | English |
|---|---|
| Title of host publication | Theory of Cryptography - 15th International Conference, TCC 2017, Proceedings |
| Editors | Yael Kalai, Leonid Reyzin |
| Publisher | Springer Verlag |
| Pages | 209-244 |
| Number of pages | 36 |
| ISBN (Print) | 9783319705026 |
| DOIs | |
| State | Published - 2017 |
| Externally published | Yes |
| Event | 15th International Conference on Theory of Cryptography, TCC 2017 - Baltimore, United States Duration: 12 Nov 2017 → 15 Nov 2017 |
Publication series
| Name | Lecture Notes in Computer Science |
|---|---|
| Volume | 10678 LNCS |
| ISSN (Print) | 0302-9743 |
| ISSN (Electronic) | 1611-3349 |
Conference
| Conference | 15th International Conference on Theory of Cryptography, TCC 2017 |
|---|---|
| Country/Territory | United States |
| City | Baltimore |
| Period | 12/11/17 → 15/11/17 |
Bibliographical note
Publisher Copyright:© 2017, International Association for Cryptologic Research.
Funding
Acknowledgments. This work was supported in part by the 2017–2018 Rothschild Postdoctoral Fellowship; by the Warren Center for Network and Data Sciences; by the financial assistance award 70NANB15H328 from the U.S. Department of Commerce, National Institute of Standards and Technology; and by the Defense Advanced Research Project Agency (DARPA) under Contract #FA8650-16-C-7622. The second author was supported in part by NSF-BSF grant 2015782, BSF grant 2012366, ISF grant 1709/14, ERC grant 742754, DARPA/ARL SAFEWARE award, NSF Frontier Award 1413955, NSF grants 1619348, 1228984, 1136174, and 1065276, a Xerox Faculty Research Award, a Google Faculty Research Award, an equipment grant from Intel, and an Okawa Foundation Research Grant. This material is based upon work supported by the DARPA through the ARL under Contract W911NF-15-C-0205. The views expressed are those of the authors and do not reflect the official policy or position of the DoD, the NSF, or the U.S. Government. This work was supported in part by NSF grants CNS-1314722, CNS-1413964.
| Funders | Funder number |
|---|---|
| NSF-BSF | 2015782 |
| National Science Foundation | 1228984, 1413955, 1065276, 1136174, 1619348 |
| National Institute of Standards and Technology | |
| Defense Advanced Research Projects Agency | 8650-16-C-7622 |
| U.S. Department of Commerce | |
| Bloom's Syndrome Foundation | 2012366 |
| Intel Corporation | |
| Army Research Laboratory | |
| Iowa Science Foundation | 1709/14 |
| Engineering Research Centers | 742754 |
| Okawa Foundation for Information and Telecommunications | CNS-1413964, W911NF-15-C-0205, CNS-1314722 |
Keywords
- AMD Circuits
- Algebraic manipulation detection
- Leakage-resilience
- Secure multiparty computation