Impossibility of Black-Box Simulation Against Leakage Attacks

被引:4
|
作者
Ostrovsky, Rafail [1 ]
Persiano, Giuseppe [2 ]
Visconti, Ivan [2 ]
机构
[1] Univ Calif Los Angeles, Los Angeles, CA USA
[2] Univ Salerno, Fisciano, Italy
来源
关键词
Zero knowledge; MPC; Resettability; Succinct arguments; Impossibility results; Black-box vs non-black-box simulation; ZERO-KNOWLEDGE; CIRCUITS;
D O I
10.1007/978-3-662-48000-7_7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this work, we show how to use the positive results on succinct argument systems to prove impossibility results on leakage-resilient black-box zero knowledge. This recently proposed notion of zero knowledge deals with an adversary that can make leakage queries on the state of the prover. Our result holds for black-box simulation only and we also give some insights on the non-black-box case. Additionally, we show that, for several functionalities, leakage-resilient multi-party computation is impossible (regardless of the number of players and even if just one player is corrupted). More in details, we achieve the above results by extending a technique of [Nielsen, Venturi, Zottarel - PKC13] to prove lower bounds for leakage-resilient security. Indeed, we use leakage queries to run an execution of a communication-efficient protocol in the head of the adversary. Moreover, to defeat the black-box simulator we connect the above technique for leakage resilience to security against reset attacks. Our results show that the open problem of [Ananth, Goyal, Pandey - Crypto 14] (i.e., continual leakage-resilient proofs without a common reference string) has a negative answer when security through black-box simulation is desired. Moreover our results close the open problem of [Boyle et al. - STOC 12] for the case of black-box simulation (i.e., the possibility of continual leakage-resilient secure computation without a leak-free interactive preprocessing).
引用
收藏
页码:130 / 149
页数:20
相关论文
共 50 条
  • [1] Practical Black-Box Attacks against Machine Learning
    Papernot, Nicolas
    McDaniel, Patrick
    Goodfellow, Ian
    Jha, Somesh
    Celik, Z. Berkay
    Swami, Ananthram
    [J]. PROCEEDINGS OF THE 2017 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIA CCS'17), 2017, : 506 - 519
  • [2] Boundary Defense Against Black-box Adversarial Attacks
    Aithal, Manjushree B.
    Li, Xiaohua
    [J]. 2022 26TH INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION (ICPR), 2022, : 2349 - 2356
  • [3] Adversarial Black-Box Attacks with Timing Side-Channel Leakage
    Nakai, Tsunato
    Suzuki, Daisuke
    Omatsu, Fumio
    Fujino, Takeshi
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2021, E104A (01) : 143 - 151
  • [4] On the Impossibility of Black-Box Transformations in Mechanism Design
    Pass, Rafael
    Seth, Karn
    [J]. ALGORITHMIC GAME THEORY, SAGT 2014, 2014, 8768 : 279 - 290
  • [5] Black-Box Adversarial Attacks against Audio Forensics Models
    Jiang, Yi
    Ye, Dengpan
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [6] An Adaptive Black-Box Defense Against Trojan Attacks (TROJDEF)
    Liu, Guanxiong
    Khreishah, Abdallah
    Sharadgah, Fatima
    Khalil, Issa
    [J]. IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2024, 35 (04) : 5367 - 5381
  • [7] Black-box Attacks Against Neural Binary Function Detection
    Bundt, Joshua
    Davinroy, Michael
    Agadakos, Ioannis
    Oprea, Alina
    Robertson, William
    [J]. PROCEEDINGS OF THE 26TH INTERNATIONAL SYMPOSIUM ON RESEARCH IN ATTACKS, INTRUSIONS AND DEFENSES, RAID 2023, 2023, : 1 - 16
  • [8] Orthogonal Deep Models as Defense Against Black-Box Attacks
    Jalwana, Mohammad A. A. K.
    Akhtar, Naveed
    Bennamoun, Mohammed
    Mian, Ajmal
    [J]. IEEE ACCESS, 2020, 8 : 119744 - 119757
  • [9] Simple Black-box Adversarial Attacks
    Guo, Chuan
    Gardner, Jacob R.
    You, Yurong
    Wilson, Andrew Gordon
    Weinberger, Kilian Q.
    [J]. INTERNATIONAL CONFERENCE ON MACHINE LEARNING, VOL 97, 2019, 97
  • [10] Impossibility results on weakly black-box hardness amplification
    Lu, Chi-Jen
    Tsai, Shi-Chun
    Wu, Hsin-Lung
    [J]. FUNDAMENTALS OF COMPUTATION THEORY, PROCEEDINGS, 2007, 4639 : 400 - +