Regular lossy functions and their applications in leakage-resilient cryptography

被引:5
|
作者
Chen, Yu [1 ,2 ,3 ]
Qin, Baodong [2 ,4 ]
Xue, Haiyang [1 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing, Peoples R China
[2] State Key Lab Cryptol, POB 5159, Beijing 100878, Peoples R China
[3] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing, Peoples R China
[4] Xian Univ Posts & Telecommun, Natl Engn Lab Wireless Secur, Xian 710121, Shaanxi, Peoples R China
基金
中国国家自然科学基金;
关键词
Regular lossy functions; Hash proof system; Leakage resilience; One-way functions; Message authentication codes (Identity-based) key encapsulation mechanism; IDENTITY-BASED ENCRYPTION; CHOSEN-CIPHERTEXT SECURITY; PUBLIC-KEY CRYPTOGRAPHY; TRAPDOOR FUNCTIONS; HYBRID ENCRYPTION; PARADIGM; CONSTRUCTIONS;
D O I
10.1016/j.tcs.2018.04.043
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In STOC 2008, Peikert and Waters introduced a powerful primitive called lossy trapdoor functions (LTFs). In a nutshell, LTFs are functions that behave in one of two modes. In the normal mode, functions are injective and invertible with a trapdoor. In the lossy mode, functions statistically lose information about their inputs. Moreover, the two modes are computationally indistinguishable. In this work, we put forward a relaxation of LTFs, namely, regular lossy functions (RLFs). Compared to LTFs, the functions in the normal mode are not required to be efficiently invertible or even unnecessary to be injective. Instead, they could also be lossy, but in a regular manner. We also put forward richer abstractions of RLFs, namely all-but-one regular lossy functions (ABO-RLFs) and one-time regular lossy filters (OT-RLFs). We show that (ABO)-RLFs admit efficient constructions from both a variety of number-theoretic assumptions and hash proof system (HPS) for subset membership problems satisfying natural algebraic properties. Thanks to the relaxations on functionality, the constructions enjoy much compact key size and better computational efficiency than that of (ABO)-LTFs. We demonstrate the utility of RLFs and their extensions in the leakage-resilient cryptography. As a special case of RLFs, lossy functions imply leakage-resilient injective one-way functions with optimal leakage rate 1 - o(1). ABO-RLFs (or OT-RLFs) immediately imply leakage-resilient one-time message authentication code (MAC) with optimal leakage rate 1 - o(1). ABO-RLFs together with HPS give rise to leakage-resilient chosen-ciphertext (CCA) secure key encapsulation mechanisms (KEM) (this approach extends naturally to the identity-based setting). Combining the construction of ABO-RLFs from HPS, this gives the first leakage-resilient CCA-secure public-key encryption (PKE) with optimal leakage rate based solely on HPS, and thus goes beyond the barrier posed by Dodis et al. (Asiacrypt 2010). Our construction also applies to the identity-based setting, yielding LR-CCA secure IB-KEM with higher leakage rate than previous works. (C) 2018 Elsevier B.V. All rights reserved.
引用
收藏
页码:13 / 38
页数:26
相关论文
共 50 条
  • [1] Leakage-Resilient Cryptography
    Dziembowski, Stefan
    Pietrzak, Krzysztof
    PROCEEDINGS OF THE 49TH ANNUAL IEEE SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, 2008, : 293 - +
  • [2] New Developments in Leakage-Resilient Cryptography
    Vaikuntanathan, Vinod
    PUBLIC KEY CRYPTOGRAPHY - PKC 2011, 2011, 6571 : 283 - 283
  • [3] Practical Leakage-Resilient Symmetric Cryptography
    Faust, Sebastian
    Pietrzak, Krzysztof
    Schipper, Joachim
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2012, 2012, 7428 : 213 - 232
  • [4] Leakage-Resilient Cryptography from Minimal Assumptions
    Carmit Hazay
    Adriana López-Alt
    Hoeteck Wee
    Daniel Wichs
    Journal of Cryptology, 2016, 29 : 514 - 551
  • [5] Leakage-Resilient Authenticated Encryption from Leakage-Resilient Pseudorandom Functions
    Kraemer, Juliane
    Struck, Patrick
    CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN (COSADE 2020), 2021, 12244 : 315 - 337
  • [6] Leakage-Resilient Incompressible Cryptography: Constructions and Barriers
    Bhushan, Kaartik
    Goyal, Rishab
    Koppula, Venkata
    Narayanan, Varun
    Prabhakaran, Manoj
    Rajasree, Mahesh Sreekumar
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2024, PT VII, 2025, 15490 : 201 - 234
  • [7] Leakage-Resilient Cryptography from Minimal Assumptions
    Hazay, Carmit
    Lopez-Alt, Adriana
    Wee, Hoeteck
    Wichs, Daniel
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2013, 2013, 7881 : 160 - 176
  • [8] Leakage-Resilient Cryptography from Minimal Assumptions
    Hazay, Carmit
    Lopez-Alt, Adriana
    Wee, Hoeteck
    Wichs, Daniel
    JOURNAL OF CRYPTOLOGY, 2016, 29 (03) : 514 - 551
  • [9] High Speed ASIC Implementations of Leakage-Resilient Cryptography
    Schilling, Robert
    Unterluggauer, Thomas
    Mangard, Stefan
    Gurkaynak, Frank K.
    Muehlberghuber, Michael
    Benini, Luca
    PROCEEDINGS OF THE 2018 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE), 2018, : 1259 - 1264
  • [10] Leakage-Resilient Cryptography from the Inner-Product Extractor
    Dziembowski, Stefan
    Faust, Sebastian
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2011, 2011, 7073 : 702 - +