• DocumentCode
    579974
  • Title

    How to Compute in the Presence of Leakage

  • Author

    Goldwasser, Shafi ; Rothblum, Guy N.

  • fYear
    2012
  • fDate
    20-23 Oct. 2012
  • Firstpage
    31
  • Lastpage
    40
  • Abstract
    We address the following problem: how to execute any algorithm P, for an unbounded number of executions, in the presence of an adversary who observes partial information on the internal state of the computation during executions. The security guarantee is that the adversary learns nothing, beyond P´s input/output behavior. This general problem is important for running cryptographic algorithms in the presence of side-channel attacks, as well as for running non-cryptographic algorithms, such as a proprietary search algorithm or a game, on a cloud server where parts of the execution´s internals might be observed. Our main result is a compiler, which takes as input an algorithm P and a security parameter κ, and produces a functionally equivalent algorithm P´. The running time of P´ is a factor of poly(κ) slower than P. P´ will be composed of a series of calls to poly(κ)-time computable sub-algorithms. During the executions of P´, an adversary algorithm A, which can choose the inputs of P´, can learn the results of adaptively chosen leakage functions - each of bounded output size Ω̃(κ) - on the sub-algorithms of P´ and the randomness they use. We prove that any computationally unbounded A observing the results of computationally unbounded leakage functions, will learn no more from its observations than it could given blackbox access only to the input-output behavior of P. This result is unconditional and does not rely on any secure hardware components.
  • Keywords
    cloud computing; computability; cryptography; file servers; program compilers; adversary algorithm; cloud server; compiler; input-output behavior; noncryptographic algorithms; poly(κ)-time computable subalgorithms; proprietary search algorithm; side-channel attacks; unbounded leakage functions; Computational modeling; Cryptography; Hardware; Integrated circuit modeling; Polynomials; Random access memory;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Foundations of Computer Science (FOCS), 2012 IEEE 53rd Annual Symposium on
  • Conference_Location
    New Brunswick, NJ
  • ISSN
    0272-5428
  • Print_ISBN
    978-1-4673-4383-1
  • Type

    conf

  • DOI
    10.1109/FOCS.2012.34
  • Filename
    6375279