Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Cryptography with Tamperable and Leaky Memory

TheIACR via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore cryptographic systems' security against physical attacks in this conference talk from Crypto 2011. Delve into a model where all memory is assumed to be both leaky and tamperable, with these vulnerabilities occurring repeatedly and continually. Learn about the construction of a signature scheme and an encryption scheme that are provably secure against such attacks, relying on the linear assumption over bilinear groups. Discover how these schemes improve upon previous results in the continual leakage regime, tolerating higher leakage rates between key updates. Examine the separate consideration of a model allowing only continual and repeated tampering with bounded leakage, and understand the positive results achieved through the possibility of "self-destruct" without memory updates.

Syllabus

Intro
Leakage Resilient Cryptography
Prior Work: Tamper Resilient Cryptography
Signature Scheme in the Continual Tampering Model
Building Block: NIZK Proofs of Knowledge
Our General Transformation s=(Gen, Sig. Ver) is a leakage resilient signature scheme
Intuition behind Security
Signature Scheme in Continual Tampering and Memory Leakage Model
Our Continual Tamper and Leakage Resilient Scheme
Conclusion

Taught by

TheIACR

Reviews

Start your review of Cryptography with Tamperable and Leaky Memory

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.