Leakage resilient one-way functions: The auxiliary-input setting

被引:1
作者
Komargodski, Ilan [1 ]
机构
[1] Cornell Tech, New York, NY 10044 USA
基金
以色列科学基金会;
关键词
One-way functions; Computational leakage resilience; Auxiliary input; CRYPTOGRAPHY; SCHEMES;
D O I
10.1016/j.tcs.2018.06.014
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Most cryptographic schemes are designed in a model where perfect secrecy of the secret key is assumed. In most physical implementations, however, some form of information leakage is inherent and unavoidable. To deal with this, a flurry of works showed how to construct basic cryptographic primitives that are resilient to various forms of leakage. Dodis et al. (FOCS '10) formalized and constructed leakage resilient one-way functions. These are one-way functions f such that given a random image f (x) and leakage g(x) it is still hard to invert f (x). Based on any one-way function, Dodis et al. constructed such a one-way function that is leakage resilient assuming that an attacker can leak any lossy function g of the input. In this work we consider the problem of constructing leakage resilient one-way functions that are secure with respect to arbitrary computationally hiding leakage (a.k.a. auxiliary input). We consider both types of leakage-selective and adaptive- and prove various possibility and impossibility results. On the negative side, we show that if the leakage is an adaptively-chosen arbitrary one-way function, then it is impossible to construct leakage resilient one-way functions. The latter is proved both in the random oracle model (without any further assumptions) and in the standard model based on a strong vector-variant of DDH. On the positive side, we observe that when the leakage is chosen ahead of time, there are leakage resilient one-way functions based on a variety of assumption. (C) 2018 Elsevier B.V. All rights reserved.
引用
收藏
页码:6 / 18
页数:13
相关论文
共 37 条
[1]  
Akavik A, 2009, LECT NOTES COMPUT SC, V5444, P474
[2]  
Alwen J, 2009, LECT NOTES COMPUT SC, V5677, P36, DOI 10.1007/978-3-642-03356-8_3
[3]  
[Anonymous], P 4 INT C INF THEOR
[4]  
Bellare M, 2014, LECT NOTES COMPUT SC, V8874, P102, DOI 10.1007/978-3-662-45608-8_6
[5]   On Strong Simulation and Composable Point Obfuscation [J].
Bitansky, Nir ;
Canetti, Ran .
JOURNAL OF CRYPTOLOGY, 2014, 27 (02) :317-357
[6]  
Boyle E, 2012, STOC'12: PROCEEDINGS OF THE 2012 ACM SYMPOSIUM ON THEORY OF COMPUTING, P1235
[7]   Fully Leakage-Resilient Signatures [J].
Boyle, Elette ;
Segev, Gil ;
Wichs, Daniel .
JOURNAL OF CRYPTOLOGY, 2013, 26 (03) :513-558
[8]   Overcoming the Hole in the Bucket: Public-Key Cryptography Resilient to Continual Memory Leakage [J].
Brakerski, Zvika ;
Kalai, Yael Tauman ;
Katz, Jonathan ;
Vaikuntanathan, Vinod .
2010 IEEE 51ST ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, 2010, :501-510
[9]  
Brakerski Z, 2010, LECT NOTES COMPUT SC, V6223, P1, DOI 10.1007/978-3-642-14623-7_1
[10]  
Brzuska C, 2014, LECT NOTES COMPUT SC, V8874, P122, DOI 10.1007/978-3-662-45608-8_7