2006 | OriginalPaper | Chapter
Private Circuits II: Keeping Secrets in Tamperable Circuits
Authors : Yuval Ishai, Manoj Prabhakaran, Amit Sahai, David Wagner
Published in: Advances in Cryptology - EUROCRYPT 2006
Publisher: Springer Berlin Heidelberg
Activate our intelligent search to find suitable subject content or patents.
Select sections of text to find matching patents with Artificial Intelligence. powered by
Select sections of text to find additional relevant content using AI-assisted search. powered by
Motivated by the problem of protecting cryptographic hardware, we continue the investigation of
private circuits
initiated in [16]. In this work, our aim is to construct circuits that should protect the secrecy of their internal state against an adversary who may modify the values of an
unbounded
number of wires,
anywhere in the circuit
. In contrast, all previous works on protecting cryptographic hardware relied on an assumption that some portion of the circuit must remain
completely free
from tampering.
We obtain the first feasibility results for such private circuits. Our main result is an efficient transformation of a circuit
C
, realizing an arbitrary (reactive) functionality, into a private circuit
C
′ realizing the same functionality. The transformed circuit can successfully detect any serious tampering and erase all data in the memory. In terms of the information available to the adversary, even in the presence of an unbounded number of adaptive wire faults, the circuit
C
′ emulates a black-box access to
C
.