We present new constructions of leakage-resilient cryptosystems, which remain provably secure even if the attacker learns some arbitrary partial information about their internal secret-key. For any polynomial
, we can instantiate these schemes so as to tolerate up to
bits of leakage. While there has been much prior work constructing such leakage-resilient cryptosystems under
... [Show full abstract] concrete number-theoretic and algebraic assumptions, we present the first schemes under general and minimal assumptions. In particular, we construct:
Leakage-resilient public-key encryption from any standard public-key encryption.
Leakage-resilient weak pseudorandom functions, symmetric-key encryption, and message-authentication codes from any one-way function.