How to Compute in the Presence of Leakage
We address the following problem: how to execute any algorithm P, for an unbounded number of executions, in the presence of an adversary who observes partial information on the internal state of the computation during executions. The security guarantee is that the adversary learns nothing, beyond P&...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Article |
Language: | English |
Published: |
Society for Industrial & Applied Mathematics (SIAM),
2018-05-17T18:42:43Z.
|
Subjects: | |
Online Access: | Get fulltext |