How to construct a leakage-resilient (stateless) trusted party

Daniel Genkin, Yuval Ishai, Mor Weiss

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

6 Scopus citations

Abstract

Trusted parties and devices are commonly used in the real world to securely perform computations on secret inputs. However, their security can often be compromised by side-channel attacks in which the adversary obtains partial leakage on intermediate computation values. This gives rise to the following natural question: To what extent can one protect the trusted party against leakage? Our goal is to design a hardware device T that allows m≥ 1 parties to securely evaluate a function f(x1, …, xm) of their inputs by feeding T with encoded inputs that are obtained using local secret randomness. Security should hold even in the presence of an active adversary that can corrupt a subset of parties and obtain restricted leakage on the internal computations in T. We design hardware devices T in this setting both for zero-knowledge proofs and for general multi-party computations. Our constructions can unconditionally resist either AC0 leakage or a strong form of “only computation leaks” (OCL) leakage that captures realistic side-channel attacks, providing different tradeoffs between efficiency and security.

Original languageEnglish
Title of host publicationTheory of Cryptography - 15th International Conference, TCC 2017, Proceedings
EditorsYael Kalai, Leonid Reyzin
PublisherSpringer Verlag
Pages209-244
Number of pages36
ISBN (Print)9783319705026
DOIs
StatePublished - 2017
Externally publishedYes
Event15th International Conference on Theory of Cryptography, TCC 2017 - Baltimore, United States
Duration: 12 Nov 201715 Nov 2017

Publication series

NameLecture Notes in Computer Science
Volume10678 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference15th International Conference on Theory of Cryptography, TCC 2017
Country/TerritoryUnited States
CityBaltimore
Period12/11/1715/11/17

Bibliographical note

Publisher Copyright:
© 2017, International Association for Cryptologic Research.

Funding

Acknowledgments. This work was supported in part by the 2017–2018 Rothschild Postdoctoral Fellowship; by the Warren Center for Network and Data Sciences; by the financial assistance award 70NANB15H328 from the U.S. Department of Commerce, National Institute of Standards and Technology; and by the Defense Advanced Research Project Agency (DARPA) under Contract #FA8650-16-C-7622. The second author was supported in part by NSF-BSF grant 2015782, BSF grant 2012366, ISF grant 1709/14, ERC grant 742754, DARPA/ARL SAFEWARE award, NSF Frontier Award 1413955, NSF grants 1619348, 1228984, 1136174, and 1065276, a Xerox Faculty Research Award, a Google Faculty Research Award, an equipment grant from Intel, and an Okawa Foundation Research Grant. This material is based upon work supported by the DARPA through the ARL under Contract W911NF-15-C-0205. The views expressed are those of the authors and do not reflect the official policy or position of the DoD, the NSF, or the U.S. Government. This work was supported in part by NSF grants CNS-1314722, CNS-1413964.

FundersFunder number
NSF-BSF2015782
National Science Foundation1228984, 1413955, 1065276, 1136174, 1619348
National Institute of Standards and Technology
Defense Advanced Research Projects Agency8650-16-C-7622
U.S. Department of Commerce
Bloom's Syndrome Foundation2012366
Intel Corporation
Army Research Laboratory
Google
Iowa Science Foundation1709/14
Engineering Research Centers742754
Okawa Foundation for Information and TelecommunicationsCNS-1413964, W911NF-15-C-0205, CNS-1314722

    Keywords

    • AMD Circuits
    • Algebraic manipulation detection
    • Leakage-resilience
    • Secure multiparty computation

    Fingerprint

    Dive into the research topics of 'How to construct a leakage-resilient (stateless) trusted party'. Together they form a unique fingerprint.

    Cite this