Motivated by real-world physical attacks, we construct cryptographic schemes that are secure even if the adversary continually tampers with the secret key in an arbitrary manner and continually obtains arbitrary partial information about the secret key. Previously, there has been a long line of work on leakage-resilient cryptography. However, in the regime of tamper-resilient cryptography, all previous work either required some non-tamperable memory, or considered only very limited tampering attacks, whereas we allow the attacker to tamper with the secret key arbitrarily.
This is joint work with Bhavana Kanukurthi and Amit Sahai.
Back to Mathematics of Information-Theoretic Cryptography