Discussion on the theoretical results of white-box cryptography

被引:2
|
作者
Lin, Tingting [1 ]
Lai, Xuejia [1 ]
Xue, Weijia [1 ]
Huang, Geshi [1 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci, Cryptog & Informat Secur Lab, Shanghai 200240, Peoples R China
基金
中国博士后科学基金; 中国国家自然科学基金;
关键词
white-box; obfuscation; cryptography; IND-CPA; white-box property (WBP); OBFUSCATION; IMPOSSIBILITY;
D O I
10.1007/s11432-015-5474-8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
White-box cryptography (WBC) aims to resist attacks from attackers who can control all the implementation details of cryptographic schemes. In 2009, Saxena et al. proposed a fundamental of white-box cryptography via the notion "white-box property" (WBP). Under this model, they proved that there do not exist obfuscators that can satisfy every security notion for a program (the negative result). On the other hand, they proved that there exists an obfuscator satisfying WBP for some security notion (the positive result). These contributions provide us a general cognition of WBC, which is big progress for the theoretical research. To better understand them, we make discussion on each result and achieve some new results. For the negative result, we prove that insufficiently secure obfuscator is the real cause of the negative result. We point out that the security of a white-box scheme cannot be guaranteed if it is instantiated by a less secure obfuscator, since the obfuscator used in their proof does not satisfy the "Virtual Black-box Property" with auxiliary input. From our proof, we also conclude that the notion WBP is equal to "Virtual Black-box Property with auxiliary input". For the positive result, we prove that security notion under black-box model should not be used in white-box context without any modification; although the positive result is meaningful, it is unlikely to prove that an obfuscator satisfies WBP for IND-CPA, since the security notion "IND-CPA" is under black-box model, which has different adversary with WBP.
引用
收藏
页数:11
相关论文
共 50 条
  • [1] Discussion on the theoretical results of white-box cryptography
    Tingting LIN
    Xuejia LAI
    Weijia XUE
    Geshi HUANG
    [J]. Science China(Information Sciences), 2016, 59 (11) : 5 - 15
  • [2] Opportunities in White-Box Cryptography
    Michiels, Wil
    [J]. IEEE SECURITY & PRIVACY, 2010, 8 (01) : 64 - 67
  • [3] White-box cryptography and an AES implementation
    Chow, S
    Eisen, P
    Johnson, H
    Van Orschot, PC
    [J]. SELECTED AREAS IN CRYPTOGRAPHY, 2003, 2595 : 250 - 270
  • [4] On the security goals of white-box cryptography
    Bock, Estuardo Alpirez
    Amadori, Alessandro
    Brzuska, Chris
    Michiels, Wil
    [J]. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2020, 2020 (02): : 327 - 357
  • [5] Discussion on the theoretical results of white-box cryptography对白盒密码理论结果的两个注释
    Tingting Lin
    Xuejia Lai
    Weijia Xue
    Geshi Huang
    [J]. Science China Information Sciences, 2016, 59
  • [6] On the Linear Transformation in White-Box Cryptography
    Lee, Seungkwang
    Jho, Nam-Su
    Kim, Myungchul
    [J]. IEEE ACCESS, 2020, 8 : 51684 - 51691
  • [7] White-Box Cryptography: Security in an Insecure Environment
    Beunardeau, Marc
    Connolly, Aisling
    Geraud, Remi
    Naccache, David
    [J]. IEEE SECURITY & PRIVACY, 2016, 14 (05) : 88 - 92
  • [8] Towards Security Notions for White-Box Cryptography
    Saxena, Amitabh
    Wyseur, Brecht
    Preneel, Bart
    [J]. INFORMATION SECURITY, PROCEEDINGS, 2009, 5735 : 49 - +
  • [9] Mechanism for Software Tamper Resistance: An Application of White-Box Cryptography
    Michiels, Wil
    Gorissen, Paul
    [J]. DRM'07: PROCEEDINGS OF THE 2007 ACM WORKSHOP ON DIGITAL RIGHTS MANAGEMENT, 2007, : 82 - 89
  • [10] White-box Cryptography Revisited: Space-Hard Ciphers
    Bogdanov, Andrey
    Isobe, Takanori
    [J]. CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 1058 - 1069