Practical leakage-resilient pseudorandom objects with minimum public randomness

  • Yu Yu*
  • , François Xavier Standaert
  • *Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

25 Scopus citations

Abstract

One of the main challenges in leakage-resilient cryptography is to obtain proofs of security against side-channel attacks, under realistic assumptions and for efficient constructions. In a recent work from CHES 2012, Faust et al. proposed new designs of stream ciphers and pseudorandom functions for this purpose. Yet, a remaining limitation of these constructions is that they require large amounts of public randomness to be proven leakage-resilient. In this paper, we show that tweaked designs with minimum randomness requirements can be proven leakage-resilient in minicrypt. That is, either these constructions are secure, or we are able to construct public-key cryptographic primitives from symmetric-key building blocks and their leakage functions (which is very unlikely). Hence, our results improve the practical relevance of two important leakage-resilient pseudorandom objects.

Original languageEnglish
Title of host publicationTopics in Cryptology, CT-RSA 2013 - The Cryptographers' Track at the RSA Conference 2013, Proceedings
Pages223-238
Number of pages16
DOIs
StatePublished - 2013
EventCryptographers' Track at the RSA Conference 2013, CT-RSA 2013 - San Francisco, CA, United States
Duration: 25 Feb 20131 Mar 2013

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume7779 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

ConferenceCryptographers' Track at the RSA Conference 2013, CT-RSA 2013
Country/TerritoryUnited States
CitySan Francisco, CA
Period25/02/131/03/13

Fingerprint

Dive into the research topics of 'Practical leakage-resilient pseudorandom objects with minimum public randomness'. Together they form a unique fingerprint.

Cite this