COOKIES: By using this website you agree that we can place Google Analytics Cookies on your device for performance monitoring. |
University of Cambridge > Talks.cam > Isaac Newton Institute Seminar Series > How to Compute in the Presence of Leakage
How to Compute in the Presence of LeakageAdd to your list(s) Download to your calendar using vCal
If you have a question about this talk, please contact Mustapha Amrani. Semantics and Syntax: A Legacy of Alan Turing We address the following problem: how to execute any algorithm, for an unbounded number of executions, in the presence of an attacker who gets to observe partial information on the internal state of the computation during executions. This general problem has beenaddressed in the last few years with varying degrees of success. It is important for running cryptographic algorithms in the presence of side-channel attacks, as well as for running non-cryptographic algorithms, such as a proprietary search algorithm or a game, on a cloud server where parts of the execution’s internals might be observed. In this work, we view algorithms as running on a leaky CPU . In each (sub)-computation run on the CPU , we allow the adversary to observe the output of an arbitrary and adaptively chosen length-bounded function on the CPU ’s input, output, and randomness. Our main result is a general compiler for transforming any algorithm into one that is secure in the presence of this family of partial observation attacks (while maintaining the algorithm’s functionality). This result is unconditional, it does not rely on any secure hardware components or cryptographic assumptions. This talk is part of the Isaac Newton Institute Seminar Series series. This talk is included in these lists:
Note that ex-directory lists are not shown. |
Other listsCambridge University Raja Yoga Meditation Society The obesity epidemic: Discussing the global health crisis Cambridge Journal of Regions, Economy and SocietyOther talksCambridge Rare Disease Summit 2017 National crises, viewed in the light of personal crises Surrogate models in Bayesian Inverse Problems Nonstationary Gaussian process emulators with covariance mixtures 70th Anniversary Celebration “Modulating Tregs in Cancer and Autoimmunity” The Gopakumar-Vafa conjecture for symplectic manifolds CANCELLED: The cognitive neuroscience of antidepressant drug action |