Distributed Public Key Schemes Secure against Continual Leakage

In this work we study distributed public key schemes secure against continual memory leakage. The secret key will be shared among two computing devices communicating over a public channel, and the decryption operation will be computed by a simple 2-party protocol between the devices. Similarly, the...

Full description

Bibliographic Details
Main Authors: Akavia, Adi, Goldwasser, Shafi, Hazay, Carmit
Other Authors: Massachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratory
Format: Article
Language:English
Published: Association for Computing Machinery (ACM) 2021
Online Access:https://hdl.handle.net/1721.1/137546
_version_ 1811083425555152896
author Akavia, Adi
Goldwasser, Shafi
Hazay, Carmit
author2 Massachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratory
author_facet Massachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratory
Akavia, Adi
Goldwasser, Shafi
Hazay, Carmit
author_sort Akavia, Adi
collection MIT
description In this work we study distributed public key schemes secure against continual memory leakage. The secret key will be shared among two computing devices communicating over a public channel, and the decryption operation will be computed by a simple 2-party protocol between the devices. Similarly, the secret key shares will be periodically refreshed by a simple 2-party protocol executed in discrete time periods throughout the lifetime of the system. The leakage adversary can choose pairs, one per device, of polynomial time computable length shrinking (or entropy shrinking) functions, and receive the value of the respective function on the internal state of the respective device (namely, on its secret share, internal randomness, and results of intermediate computations). We present distributed public key encryption (DPKE) and distributed identity based encryption (DIBE) schemes that are secure against continual memory leakage, under the Bilinear Decisional Diffie-Hellman and $2$-linear assumptions. Our schemes have the following properties: 1. Our DPKE and DIBE schemes tolerate leakage at all times, including during refresh. During refresh the tolerated leakage is a (1/2-o (1),1)-fraction of the secret memory of P 1, P 2 respectively; and at all other times (post key generation) the tolerated leakage is a (1-o (1),1)-fraction of the secret memory of P 1, P 2 respectively. Our DIBE scheme tolerates leakage from both the master secret key and the identity based secret keys. Our DPKE scheme is CCA2-secure against continual memory leakage. Our DPKE scheme also implies a secure storage system on leaky devices, where a value s can be secretely stored on devices that continually leak information about their internal state to an external attacker. The devices go through a periodic refresh protocol. These properties improve on bounds and properties of known constructions designed to be secure against continual memory leakage in the single processor model. © 2012 ACM.
first_indexed 2024-09-23T12:32:52Z
format Article
id mit-1721.1/137546
institution Massachusetts Institute of Technology
language English
last_indexed 2024-09-23T12:32:52Z
publishDate 2021
publisher Association for Computing Machinery (ACM)
record_format dspace
spelling mit-1721.1/1375462022-10-01T09:42:16Z Distributed Public Key Schemes Secure against Continual Leakage Akavia, Adi Goldwasser, Shafi Hazay, Carmit Massachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratory In this work we study distributed public key schemes secure against continual memory leakage. The secret key will be shared among two computing devices communicating over a public channel, and the decryption operation will be computed by a simple 2-party protocol between the devices. Similarly, the secret key shares will be periodically refreshed by a simple 2-party protocol executed in discrete time periods throughout the lifetime of the system. The leakage adversary can choose pairs, one per device, of polynomial time computable length shrinking (or entropy shrinking) functions, and receive the value of the respective function on the internal state of the respective device (namely, on its secret share, internal randomness, and results of intermediate computations). We present distributed public key encryption (DPKE) and distributed identity based encryption (DIBE) schemes that are secure against continual memory leakage, under the Bilinear Decisional Diffie-Hellman and $2$-linear assumptions. Our schemes have the following properties: 1. Our DPKE and DIBE schemes tolerate leakage at all times, including during refresh. During refresh the tolerated leakage is a (1/2-o (1),1)-fraction of the secret memory of P 1, P 2 respectively; and at all other times (post key generation) the tolerated leakage is a (1-o (1),1)-fraction of the secret memory of P 1, P 2 respectively. Our DIBE scheme tolerates leakage from both the master secret key and the identity based secret keys. Our DPKE scheme is CCA2-secure against continual memory leakage. Our DPKE scheme also implies a secure storage system on leaky devices, where a value s can be secretely stored on devices that continually leak information about their internal state to an external attacker. The devices go through a periodic refresh protocol. These properties improve on bounds and properties of known constructions designed to be secure against continual memory leakage in the single processor model. © 2012 ACM. 2021-11-05T16:52:41Z 2021-11-05T16:52:41Z 2012 2019-05-29T14:51:05Z Article http://purl.org/eprint/type/ConferencePaper https://hdl.handle.net/1721.1/137546 Akavia, Adi, Goldwasser, Shafi and Hazay, Carmit. 2012. "Distributed Public Key Schemes Secure against Continual Leakage." en 10.1145/2332432.2332462 Creative Commons Attribution-Noncommercial-Share Alike http://creativecommons.org/licenses/by-nc-sa/4.0/ application/pdf Association for Computing Machinery (ACM) other univ website
spellingShingle Akavia, Adi
Goldwasser, Shafi
Hazay, Carmit
Distributed Public Key Schemes Secure against Continual Leakage
title Distributed Public Key Schemes Secure against Continual Leakage
title_full Distributed Public Key Schemes Secure against Continual Leakage
title_fullStr Distributed Public Key Schemes Secure against Continual Leakage
title_full_unstemmed Distributed Public Key Schemes Secure against Continual Leakage
title_short Distributed Public Key Schemes Secure against Continual Leakage
title_sort distributed public key schemes secure against continual leakage
url https://hdl.handle.net/1721.1/137546
work_keys_str_mv AT akaviaadi distributedpublickeyschemessecureagainstcontinualleakage
AT goldwassershafi distributedpublickeyschemessecureagainstcontinualleakage
AT hazaycarmit distributedpublickeyschemessecureagainstcontinualleakage