Leakage-Resilient Cryptography From the Inner-Product Extractor

  title={Leakage-Resilient Cryptography From the Inner-Product Extractor},
  author={Stefan Dziembowski and S. Faust},
  journal={IACR Cryptol. ePrint Arch.},
  • Stefan Dziembowski, S. Faust
  • Published 2011
  • Computer Science, Mathematics
  • IACR Cryptol. ePrint Arch.
  • We present a generic method to secure various widely-used cryptosystems against arbitrary side-channel leakage, as long as the leakage adheres three restrictions: first, it is bounded per observation but in total can be arbitrary large. Second, memory parts leak independently, and, third, the randomness that is used for certain operations comes from a simple (non-uniform) distribution. As a fundamental building block, we construct a scheme to store a cryptographic secret such that it remains… CONTINUE READING
    68 Citations
    Continuous leakage-resilient certificate-based encryption
    • 32
    Post-challenge leakage in public-key encryption
    • 11
    A Leakage-Resilient Pairing-Based Variant of the Schnorr Signature Scheme
    • 7
    • PDF
    Efficient leakage-resilient public key encryption from DDH assumption
    • 22


    Securing Computation against Continuous Leakage
    • 78
    • Highly Influential
    • PDF
    On Protecting Cryptographic Keys Against Continual Leakage
    • 84
    • Highly Influential
    • PDF
    Overcoming the Hole in the Bucket: Public-Key Cryptography Resilient to Continual Memory Leakage
    • 203
    Cryptography against Continuous Memory Attacks
    • 202
    • PDF
    Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
    • 277
    • PDF
    Leakage-Resilient Cryptography
    • 478
    • PDF
    Efficient Public-Key Cryptography in the Presence of Key Leakage
    • 172
    • PDF
    Fully Leakage-Resilient Signatures
    • 69
    • PDF
    Practical leakage-resilient pseudorandom generators
    • 94
    • PDF