Cryptography Against Continuous Memory Attacks

Free registration required

Executive Summary

The authors say that a cryptographic scheme is Continuous Leakage-Resilient (CLR), if it allows users to refresh their secret keys, using only fresh local randomness, such that: The scheme remains functional after any number of key refreshes, although the public key never changes. Thus, the "Outside world" is neither affected by these key refreshes, nor needs to know about their frequency. The scheme remains secure even if the adversary can continuously leak arbitrary information about the current secret-key of the system, as long as the amount of leaked information is bounded in between any two successive key refreshes. There is no bound on the total amount of information that can be leaked during the lifetime of the system.

  • Format: PDF
  • Size: 675.7 KB