Limits of a conjecture on a leakage-resilient cryptosystem

  • Authors:
  • David Galindo;Srinivas Vivek

  • Affiliations:
  • CNRS/LORIA, íquipe Cassis, Bít. A, 54506 Vandoeuvre-lès-Nancy Cedex, France;University of Luxembourg, FSTC, 6 rue Richard Coudenhove-Kalergi, L-1359 Luxembourg

  • Venue:
  • Information Processing Letters
  • Year:
  • 2014

Quantified Score

Hi-index 0.89

Visualization

Abstract

Recently it was conjectured that an ElGamal-based public-key encryption scheme with stateful decryption resists lunch-time chosen ciphertext and leakage attacks in the only computation leaks information model. We give a non-trivial upper bound on the amount of leakage tolerated by this conjecture. More precisely, we prove that the conjecture does not hold if more than a (38+o(1)) fraction of the bits are leaked at every decryption step, by showing a lunch-time attack that recovers the full secret key. The attack uses a new variant of the Hidden Number Problem, that we call Hidden Shares - Hidden Number Problem, which is of independent interest.