Intrusion-Resilience Via the Bounded-Storage Model

@inproceedings{Dziembowski2006IntrusionResilienceVT,
  title={Intrusion-Resilience Via the Bounded-Storage Model},
  author={Stefan Dziembowski},
  booktitle={TCC},
  year={2006}
}
  • Stefan Dziembowski
  • Published in TCC 2006
  • Computer Science
  • We introduce a new method of achieving intrusion-resilience in the cryptographic protocols. More precisely we show how to preserve security of such protocols, even if a malicious program (e.g. a virus) was installed on a computer of an honest user (and it was later removed). The security of our protocols relies on the assumption that the amount of data that the adversary can transfer from the infected machine is limited (however, we allow the adversary to perform any efficient computation on… CONTINUE READING
    125 Citations
    Intrusion-Resilient Authentication in the Limited Communication Model
    • 3
    On Forward-Secure Storage
    • 34
    • PDF
    Key-Evolution Schemes Resilient to Space-Bounded Leakage
    • 37
    • PDF
    Intrusion-Resilient Secret Sharing
    • 110
    • PDF
    Intrusion-Resilient Secret Sharing
    • 26
    Leakage-Resilient Cryptography with Key Derived from Sensitive Data
    • 2
    • Highly Influenced
    • PDF
    Bounded Tamper Resilience: How to Go beyond the Algebraic Barrier
    • 31
    • PDF
    Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
    • 277
    • Highly Influenced
    • PDF

    References

    SHOWING 1-10 OF 47 REFERENCES
    Protecting Secret Data from Insider Attacks
    • 21
    • PDF
    Everlasting security in the bounded storage model
    • 131
    • Highly Influential
    Intrusion-Resilient Public-Key Encryption
    • 86
    • Highly Influential
    Unconditional Security Against Memory-Bounded Adversaries
    • 170
    • PDF
    Encryption against Storage-Bounded Adversaries from On-Line Strong Extractors
    • C. Lu
    • Computer Science
    • Journal of Cryptology
    • 2003
    • 72
    • Highly Influential
    Non-interactive Timestamping in the Bounded-Storage Model
    • 15
    • PDF
    On Generating the Initial Key in the Bounded-Storage Model
    • 65
    • PDF
    Error Correction in the Bounded Storage Model
    • Y. Ding
    • Mathematics, Computer Science
    • TCC
    • 2005
    • 23
    • PDF
    Exposure-resilient cryptography
    • 62