In this work we study distributed public key schemes secure against continual memory leakage. The secret key will be shared among two computing devices communicating over a public channel, and the decryption operation will be com-puted by a simple 2-party protocol between the devices. Similarly, the secret key shares will be periodically refreshed by a simple 2-party protocol executed in discrete time peri-ods throughout the lifetime of the system. The leakage ad-versary can choose pairs, one per device, of polynomial time computable length shrinking (or entropy shrinking) func-tions, and receive the value of the respective function on the internal state of the respective device (namely, on its se-cret share, internal randomness, and result...
We initiate the study of the leakage-resilience of the information-theoretic key distribution scheme...
Traditional secret sharing assume the absolute secrecy of the private shares of the uncorrupted user...
Part 1: Modern CryptographyInternational audienceSide-channel attacks are a major issue for implemen...
In this work we study distributed public key schemes secure against continual memory leakage. The se...
Deterministic public-key encryption, introduced by Bellare, Boldyreva, and O’Neill (CRYPTO 2007), is...
Abstract.We introduce the notion of distributed password-based public-key cryptography, where a virt...
Distributed protocols allow a cryptographic scheme to distribute its operation among a group of part...
A Key Distribution Center of a network is a server who generates anddistributes secret keys to group...
Traditional secret sharing assume the absolute secrecy of the private shares of the uncorrupted user...
Abstract — In a distributed key distribution scheme, a set of servers help a set of users in a group...
In a distributed key distribution scheme, a set of servers help a set of users in a group to securel...
A fundamental question in leakage-resilient cryptography is: can leakage resilience always be amplif...
Abstract—In a distributed key distribution scheme, a set of servers helps a set of users in a group ...
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Comp...
We construct a multiparty computation (MPC) protocol that is secure even if a malicious adversary, i...
We initiate the study of the leakage-resilience of the information-theoretic key distribution scheme...
Traditional secret sharing assume the absolute secrecy of the private shares of the uncorrupted user...
Part 1: Modern CryptographyInternational audienceSide-channel attacks are a major issue for implemen...
In this work we study distributed public key schemes secure against continual memory leakage. The se...
Deterministic public-key encryption, introduced by Bellare, Boldyreva, and O’Neill (CRYPTO 2007), is...
Abstract.We introduce the notion of distributed password-based public-key cryptography, where a virt...
Distributed protocols allow a cryptographic scheme to distribute its operation among a group of part...
A Key Distribution Center of a network is a server who generates anddistributes secret keys to group...
Traditional secret sharing assume the absolute secrecy of the private shares of the uncorrupted user...
Abstract — In a distributed key distribution scheme, a set of servers help a set of users in a group...
In a distributed key distribution scheme, a set of servers help a set of users in a group to securel...
A fundamental question in leakage-resilient cryptography is: can leakage resilience always be amplif...
Abstract—In a distributed key distribution scheme, a set of servers helps a set of users in a group ...
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Comp...
We construct a multiparty computation (MPC) protocol that is secure even if a malicious adversary, i...
We initiate the study of the leakage-resilience of the information-theoretic key distribution scheme...
Traditional secret sharing assume the absolute secrecy of the private shares of the uncorrupted user...
Part 1: Modern CryptographyInternational audienceSide-channel attacks are a major issue for implemen...