Private circuits II: Keeping secrets in tamperable circuits

Yuval Ishai, Manoj Prabhakaran, Amit Sahai, David Wagner

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Motivated by the problem of protecting cryptographic hardware, we continue the investigation of private circuits initiated in [16]. In this work, our aim is to construct circuits that should protect the secrecy of their internal state against an adversary who may modify the values of an unbounded number of wires, anywhere in the circuit. In contrast, all previous works on protecting cryptographic hardware relied on an assumption that some portion of the circuit must remain completely free from tampering. We obtain the first feasibility results for such private circuits. Our main result is an efficient transformation of a circuit C, realizing an arbitrary (reactive) functionality, into a private circuit C′ realizing the same functionality. The transformed circuit can successfully detect any serious tampering and erase all data in the memory. In terms of the information available to the adversary, even in the presence of an unbounded number of adaptive wire faults, the circuit C′ emulates a black-box access to C.

Original languageEnglish (US)
Title of host publicationAdvances in Cryptology - EUROCRYPT 2006 - 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings
PublisherSpringer-Verlag Berlin Heidelberg
Pages308-327
Number of pages20
ISBN (Print)3540345469, 9783540345466
DOIs
StatePublished - 2006
Event24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2006 - St. Petersburg, Russian Federation
Duration: May 28 2006Jun 1 2006

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4004 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2006
CountryRussian Federation
CitySt. Petersburg
Period5/28/066/1/06

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint Dive into the research topics of 'Private circuits II: Keeping secrets in tamperable circuits'. Together they form a unique fingerprint.

Cite this