Date Added: Apr 2011
The authors put forth a framework for expressing security requirements from interactive protocols in the presence of arbitrary leakage. This allows capturing different levels of leakage tolerance of protocols, namely the preservation (or degradation) of security, under coordinated attacks that include various forms of leakage from the secret states of participating components. The framework extends the Universally Composable (UC) security framework. They also prove a variant of the UC theorem that enables modular design and analysis of protocols even in face of general, non-modular leakage. They then construct leakage tolerant protocols for basic tasks, such as, secure message transmission, message authentication, commitment, oblivious transfer and zero knowledge.