Resistance to Timing Attacks for Sampling and Privacy Preserving Schemes

Yoav Ben Dov, Liron David*, Moni Naor*, Elad Tzalik*

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Side channel attacks, and in particular timing attacks, are a fundamental obstacle for secure implementation of algorithms and cryptographic protocols. These attacks and countermeasures have been widely researched for decades. We offer a new perspective on resistance to timing attacks. We focus on sampling algorithms and their application to differential privacy. We define sampling algorithms that do not reveal information about the sampled output through their running time. More specifically: (1) We characterize the distributions that can be sampled from in a “time oblivious” way, meaning that the running time does not leak any information about the output. We provide an optimal algorithm in terms of randomness used to sample for these distributions. We give an example of an efficient randomized algorithm A such that there is no subexponential algorithm with the same output as A that does not reveal information on the output or the input, therefore we show leaking information on either the input or the output is unavoidable. (2) We consider the impact of timing attacks on (pure) differential privacy mechanisms. It turns out that if the range of the mechanism is unbounded, such as counting, then any time oblivious pure DP mechanism must give a useless output with constant probability (the constant is mechanism dependent) and must have infinite expected running time. We show that up to this limitations it is possible to transform any pure DP mechanism into a time oblivious one.

Original languageEnglish
Title of host publication4th Symposium on Foundations of Responsible Computing, FORC 2023
EditorsKunal Talwar
PublisherSchloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing
ISBN (Electronic)9783959772723
DOIs
StatePublished - 1 Jun 2023
Externally publishedYes
Event4th Symposium on Foundations of Responsible Computing, FORC 2023 - Stanford, United States
Duration: 7 Jun 20239 Jun 2023

Publication series

NameLeibniz International Proceedings in Informatics, LIPIcs
Volume256
ISSN (Print)1868-8969

Conference

Conference4th Symposium on Foundations of Responsible Computing, FORC 2023
Country/TerritoryUnited States
CityStanford
Period7/06/239/06/23

Keywords

  • Differential Privacy

Fingerprint

Dive into the research topics of 'Resistance to Timing Attacks for Sampling and Privacy Preserving Schemes'. Together they form a unique fingerprint.

Cite this