Leakage Resilient One-Way Functions: The Auxiliary-Input Setting

被引:4
作者
Komargodski, Ilan [1 ]
机构
[1] Weizmann Inst Sci, Rehovot, Israel
来源
THEORY OF CRYPTOGRAPHY, TCC 2016-B, PT I | 2016年 / 9985卷
关键词
CRYPTOGRAPHY; CIRCUITS; SCHEMES;
D O I
10.1007/978-3-662-53641-4_6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Most cryptographic schemes are designed in a model where perfect secrecy of the secret key is assumed. In most physical implementations, however, some form of information leakage is inherent and unavoidable. To deal with this, a flurry of works showed how to construct basic cryptographic primitives that are resilient to various forms of leakage. Dodis et al. (FOCS ' 10) formalized and constructed leakage resilient one-way functions. These are one-way functions f such that given a random image f(x) and leakage g( x) it is still hard to invert f(x). Based on any one-way function, Dodis et al. constructed such a one-way function that is leakage resilient assuming that an attacker can leak any lossy function g of the input. In this work we consider the problem of constructing leakage resilient one-way functions that are secure with respect to arbitrary computationally hiding leakage (a.k.a auxiliary-input). We consider both types of leakage - selective and adaptive - and prove various possibility and impossibility results. On the negative side, we show that if the leakage is an adaptively-chosen arbitrary one-way function, then it is impossible to construct leakage resilient one-way functions. The latter is proved both in the random oracle model (without any further assumptions) and in the standard model based on a strong vector-variant of DDH. On the positive side, we observe that when the leakage is chosen ahead of time, there are leakage resilient one-way functions based on a variety of assumption.
引用
收藏
页码:139 / 158
页数:20
相关论文
共 36 条
[1]  
Akavik A, 2009, LECT NOTES COMPUT SC, V5444, P474
[2]  
Alwen J, 2010, LECT NOTES COMPUT SC, V5973, P1, DOI 10.1007/978-3-642-14496-7_1
[3]  
Alwen J, 2009, LECT NOTES COMPUT SC, V5677, P36, DOI 10.1007/978-3-642-03356-8_3
[4]  
Bellare M, 2014, LECT NOTES COMPUT SC, V8874, P102, DOI 10.1007/978-3-662-45608-8_6
[5]   On Strong Simulation and Composable Point Obfuscation [J].
Bitansky, Nir ;
Canetti, Ran .
JOURNAL OF CRYPTOLOGY, 2014, 27 (02) :317-357
[6]  
Boyle E, 2012, STOC'12: PROCEEDINGS OF THE 2012 ACM SYMPOSIUM ON THEORY OF COMPUTING, P1235
[7]   Fully Leakage-Resilient Signatures [J].
Boyle, Elette ;
Segev, Gil ;
Wichs, Daniel .
JOURNAL OF CRYPTOLOGY, 2013, 26 (03) :513-558
[8]   Overcoming the Hole in the Bucket: Public-Key Cryptography Resilient to Continual Memory Leakage [J].
Brakerski, Zvika ;
Kalai, Yael Tauman ;
Katz, Jonathan ;
Vaikuntanathan, Vinod .
2010 IEEE 51ST ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, 2010, :501-510
[9]  
Brakerski Z, 2010, LECT NOTES COMPUT SC, V6223, P1, DOI 10.1007/978-3-642-14623-7_1
[10]  
Brzuska C, 2014, LECT NOTES COMPUT SC, V8874, P122, DOI 10.1007/978-3-662-45608-8_7