University of Cambridge > Talks.cam > Isaac Newton Institute Seminar Series > How to Compute in the Presence of Leakage

How to Compute in the Presence of Leakage

Add to your list(s) Download to your calendar using vCal

If you have a question about this talk, please contact Mustapha Amrani.

Semantics and Syntax: A Legacy of Alan Turing

We address the following problem: how to execute any algorithm, for an unbounded number of executions, in the presence of an attacker who gets to observe partial information on the internal state of the computation during executions.

This general problem has beenaddressed in the last few years with varying degrees of success. It is important for running cryptographic algorithms in the presence of side-channel attacks, as well as for running non-cryptographic algorithms, such as a proprietary search algorithm or a game, on a cloud server where parts of the execution’s internals might be observed.

In this work, we view algorithms as running on a leaky CPU . In each (sub)-computation run on the CPU , we allow the adversary to observe the output of an arbitrary and adaptively chosen length-bounded function on the CPU ’s input, output, and randomness.

Our main result is a general compiler for transforming any algorithm into one that is secure in the presence of this family of partial observation attacks (while maintaining the algorithm’s functionality). This result is unconditional, it does not rely on any secure hardware components or cryptographic assumptions.

This talk is part of the Isaac Newton Institute Seminar Series series.

Tell a friend about this talk:

This talk is included in these lists:

Note that ex-directory lists are not shown.

 

© 2006-2024 Talks.cam, University of Cambridge. Contact Us | Help and Documentation | Privacy and Publicity