Sciweavers

CRYPTO
2012
Springer

Securing Circuits against Constant-Rate Tampering

11 years 6 months ago
Securing Circuits against Constant-Rate Tampering
We present a compiler that converts any circuit into one that remains secure even if a constant fraction of its wires are tampered with. Following the seminal work of Ishai et al. (Eurocrypt 2006), we consider adversaries who may choose an arbitrary set of wires to corrupt, and may set each such wire to 0 or to 1, or may toggle with the wire. We prove that such adversaries, who continuously tamper with the circuit, can learn at most logarithmically many bits of secret information (in addition to black-box access to the circuit). Our results are information theoretic. Key words: side-channel attacks, tampering, circuit compiler, PCP of proximity
Dana Dachman-Soled, Yael Tauman Kalai
Added 28 Sep 2012
Updated 28 Sep 2012
Type Journal
Year 2012
Where CRYPTO
Authors Dana Dachman-Soled, Yael Tauman Kalai
Comments (0)