TY - GEN

T1 - Survey

T2 - 4th International Conference on Information Theoretic Security, ICITS 2009

AU - Alwen, Joël

AU - Dodis, Yevgeniy

AU - Wichs, Daniel

PY - 2010

Y1 - 2010

N2 - This survey paper studies recent advances in the field of Leakage-Resilient Cryptography. This booming area is concerned with the design of cryptographic primitives resistant to arbitrary side-channel attacks, where an attacker can repeatedly and adaptively learn information about the secret key, subject only to the constraint that the overall amount of such information is bounded by some parameter ℓ. We start by surveying recent results in the so called Relative Leakage Model, where all the parameters of the system are allowed to depend on ℓ, and the goal is to make ℓ large relative to the length of the secret key. We conclude by showing how to extend the relative leakage results to the Bounded Retrieval Model (aka "Absolute Leakage Model"), where only the secret key length is allowed to be slightly larger than ℓ, but all other system parameters (e.g., public-key, communication, etc.) are independent of the absolute value of ℓ. Throughout the presentation we will emphasize the information-theoretic techniques used in leakage-resilient cryptography.

AB - This survey paper studies recent advances in the field of Leakage-Resilient Cryptography. This booming area is concerned with the design of cryptographic primitives resistant to arbitrary side-channel attacks, where an attacker can repeatedly and adaptively learn information about the secret key, subject only to the constraint that the overall amount of such information is bounded by some parameter ℓ. We start by surveying recent results in the so called Relative Leakage Model, where all the parameters of the system are allowed to depend on ℓ, and the goal is to make ℓ large relative to the length of the secret key. We conclude by showing how to extend the relative leakage results to the Bounded Retrieval Model (aka "Absolute Leakage Model"), where only the secret key length is allowed to be slightly larger than ℓ, but all other system parameters (e.g., public-key, communication, etc.) are independent of the absolute value of ℓ. Throughout the presentation we will emphasize the information-theoretic techniques used in leakage-resilient cryptography.

UR - http://www.scopus.com/inward/record.url?scp=78149275873&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=78149275873&partnerID=8YFLogxK

U2 - 10.1007/978-3-642-14496-7_1

DO - 10.1007/978-3-642-14496-7_1

M3 - Conference contribution

AN - SCOPUS:78149275873

SN - 3642144950

SN - 9783642144950

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 1

EP - 18

BT - Information Theoretic Security - 4th International Conference, ICITS 2009, Revised Selected Papers

Y2 - 3 December 2009 through 6 December 2009

ER -