1. Leakage-Resilient Non-interactive Key Exchange in the Continuous-Memory Leakage Setting
- Author
-
C. Pandu Rangan, Janaka Alawatugoda, and Suvradip Chakraborty
- Subjects
Hardware_MEMORYSTRUCTURES ,Cryptographic primitive ,Theoretical computer science ,Computer science ,business.industry ,Open problem ,Hash function ,0102 computer and information sciences ,02 engineering and technology ,Encryption ,01 natural sciences ,Memory leak ,010201 computation theory & mathematics ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,business ,Key exchange ,Leakage (electronics) - Abstract
Recently, Chakraborty et al. (Cryptoeprint:2017:441) showed a novel approach of constructing several leakage-resilient cryptographic primitives by introducing a new primitive called leakage-resilient non-interactive key exchange (LR-NIKE). Their construction of LR-NIKE was only in the bounded-memory leakage model, and they left open the construction of LR-NIKE in continuous-memory leakage model. In this paper we address that open problem. Moreover, we extend the continuous-memory leakage model by addressing more realistic after-the-fact leakage. The main ingredients of our construction are a leakage-resilient storage scheme and a refreshing protocol (Dziembowski and Faust, Asiacrypt 2011) and a (standard) chameleon hash function (CHF), equipped with an additional property of oblivious sampling, which we introduce. We observe that the present constructions of CHF already satisfies our new notion. Further, our protocol can be used as a building block to construct leakage-resilient public-key encryption schemes, interactive key exchange and low-latency key exchange protocols in the continuous-memory leakage model, following the approach of Chakraborty et al. (Cryptoeprint:2017:441).
- Published
- 2017