[Colloquium] THEORY SEMINAR TODAY: Yevgeniy Dodis

Katie Casey caseyk at cs.uchicago.edu
Fri Oct 8 08:23:54 CDT 2010


DEPARTMENT OF COMPUTER SCIENCE

UNIVERSITY OF CHICAGO

Date: Friday, October 8, 2010
Time: 2:30 p.m.
Place: Ryerson 251, 1100 E. 58th Street

----------------------------------------------

Speaker:		Yevgeniy Dodis

From:		New York University

Web page:	http://cs.nyu.edu/~dodis/

Title: Cryptography Against Continuous Memory Attacks

Abstract:  We say that a cryptographic scheme is Continuous Leakage-Resilient (CLR), if it allows users to refresh their secret keys, using only fresh local randomness, such that:

--The scheme remains functional after any number of key refreshes, although the public key never changes. Thus, the "outside world" is neither affected by these key refreshes, nor needs to know about their frequency.

--The scheme remains secure even if the adversary can continuously leak arbitrary information about the current secret-key of the system, as long as the amount of leaked information is bounded in between any two successive key refreshes. There is no bound on the total amount of information that can be leaked during the lifetime of the system.

In this work, we construct a variety of practical CLR schemes, including CLR one-way relations, CLR signatures, CLR identification schemes, and CLR authenticated key agreement protocols. For each of the above, we give general  constructions, and then show how to instantiate them efficiently using a well established assumption on bilinear groups, called the K-Linear assumption.

Joint work with Kristiyan Haralambiev and Adriana Lopez-Alt and Daniel Wichs. The extended abstract of this paper will appear at FOCS'10 and can be found at http://eprint.iacr.org/2010/196.

Refreshments will be served following the talk at 3:30 in Ryerson 255.


More information about the Colloquium mailing list