Private circuits II: Keeping secrets in tamperable circuits

Yuval Ishai, Manoj Prabhakaran, Amit Sahai, David Wagner

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

123 Scopus citations

Abstract

Motivated by the problem of protecting cryptographic hardware, we continue the investigation of private circuits initiated in [16]. In this work, our aim is to construct circuits that should protect the secrecy of their internal state against an adversary who may modify the values of an unbounded number of wires, anywhere in the circuit. In contrast, all previous works on protecting cryptographic hardware relied on an assumption that some portion of the circuit must remain completely free from tampering. We obtain the first feasibility results for such private circuits. Our main result is an efficient transformation of a circuit C, realizing an arbitrary (reactive) functionality, into a private circuit C′ realizing the same functionality. The transformed circuit can successfully detect any serious tampering and erase all data in the memory. In terms of the information available to the adversary, even in the presence of an unbounded number of adaptive wire faults, the circuit C′ emulates a black-box access to C.

Original languageEnglish
Title of host publicationAdvances in Cryptology - EUROCRYPT 2006 - 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings
Pages308-327
Number of pages20
DOIs
StatePublished - 2006
Event24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2006 - St. Petersburg, Russian Federation
Duration: 28 May 20061 Jun 2006

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4004 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2006
Country/TerritoryRussian Federation
CitySt. Petersburg
Period28/05/061/06/06

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'Private circuits II: Keeping secrets in tamperable circuits'. Together they form a unique fingerprint.

Cite this