Protecting Cryptographic Keys against Continual Leakage

  • Ali Juma
  • Yevgeniy Vahlis
Conference paper

DOI: 10.1007/978-3-642-14623-7_3

Part of the Lecture Notes in Computer Science book series (LNCS, volume 6223)
Cite this paper as:
Juma A., Vahlis Y. (2010) Protecting Cryptographic Keys against Continual Leakage. In: Rabin T. (eds) Advances in Cryptology – CRYPTO 2010. CRYPTO 2010. Lecture Notes in Computer Science, vol 6223. Springer, Berlin, Heidelberg


Side-channel attacks have often proven to have a devastating effect on the security of cryptographic schemes. In this paper, we address the problem of storing cryptographic keys and computing on them in a manner that preserves security even when the adversary is able to obtain information leakage during the computation on the key.

Using any fully homomorphic encryption with re-randomizable ciphertexts, we show how to encapsulate a key and repeatedly evaluate arbitrary functions on it so that no adversary can gain any useful information from a large class of side-channel attacks. We work in the model of Micali and Reyzin, assuming that only the active part of memory during computation leaks information. Our construction makes use of a single “leak-free” hardware token that samples from a distribution that does not depend on the protected key or the function that is evaluated on it.

Our construction is the first general compiler to achieve resilience against polytime leakage functions without performing any leak-free computation on the protected key. Furthermore, the amount of computation our construction must perform does not grow with the amount of leakage the adversary is able to obtain; instead, it suffices to make a stronger assumption about the security of the fully homomorphic encryption.

Download to read the full conference paper text

Copyright information

© Springer-Verlag Berlin Heidelberg 2010

Authors and Affiliations

  • Ali Juma
    • 1
  • Yevgeniy Vahlis
    • 1
  1. 1.Department of Computer ScienceUniversity of Toronto 

Personalised recommendations