Leakage-Resilient Cryptography from Minimal Assumptions

被引:0
|
作者
Carmit Hazay
Adriana López-Alt
Hoeteck Wee
Daniel Wichs
机构
[1] Bar-Ilan University,
[2] New York University,undefined
[3] CNRS and ENS,undefined
[4] Northeastern University,undefined
来源
Journal of Cryptology | 2016年 / 29卷
关键词
Leakage Resilience; Hash Proof System (HPS); Weak PRF; Leakage Oracle; Leakage Queries;
D O I
暂无
中图分类号
学科分类号
摘要
We present new constructions of leakage-resilient cryptosystems, which remain provably secure even if the attacker learns some arbitrary partial information about their internal secret-key. For any polynomial ℓ\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\ell $$\end{document}, we can instantiate these schemes so as to tolerate up to ℓ\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\ell $$\end{document} bits of leakage. While there has been much prior work constructing such leakage-resilient cryptosystems under concrete number-theoretic and algebraic assumptions, we present the first schemes under general and minimal assumptions. In particular, we construct:Leakage-resilient public-key encryption from any standard public-key encryption.Leakage-resilient weak pseudorandom functions, symmetric-key encryption, and message-authentication codes from any one-way function. These are the first constructions of leakage-resilient symmetric-key primitives that do not rely on public-key assumptions. We also get the first constructions of leakage-resilient public-key encryption from “search assumptions,” such as the hardness of factoring or CDH. Although our schemes can tolerate arbitrarily large amounts of leakage, the tolerated rate of leakage (defined as the ratio of leakage amount to key size) is rather poor in comparison with prior results under specific assumptions. As a building block of independent interest, we study a notion of weak hash-proof systems in the public-key and symmetric-key settings. While these inherit some of the interesting security properties of standard hash-proof systems, we can instantiate them under general assumptions.
引用
收藏
页码:514 / 551
页数:37
相关论文
共 50 条
  • [1] Leakage-Resilient Cryptography from Minimal Assumptions
    Hazay, Carmit
    Lopez-Alt, Adriana
    Wee, Hoeteck
    Wichs, Daniel
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2013, 2013, 7881 : 160 - 176
  • [2] Leakage-Resilient Cryptography from Minimal Assumptions
    Hazay, Carmit
    Lopez-Alt, Adriana
    Wee, Hoeteck
    Wichs, Daniel
    [J]. JOURNAL OF CRYPTOLOGY, 2016, 29 (03) : 514 - 551
  • [3] Leakage-resilient identity-based cryptography from minimal assumptions
    Zhou, Yanwei
    Yang, Bo
    Qiao, Zirui
    Xia, Zhe
    Zhang, Mingwu
    Mu, Yi
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2023, 91 (11) : 3757 - 3801
  • [4] Leakage-resilient identity-based cryptography from minimal assumptions
    Yanwei Zhou
    Bo Yang
    Zirui Qiao
    Zhe Xia
    Mingwu Zhang
    Yi Mu
    [J]. Designs, Codes and Cryptography, 2023, 91 : 3757 - 3801
  • [5] Leakage-Resilient Cryptography
    Dziembowski, Stefan
    Pietrzak, Krzysztof
    [J]. PROCEEDINGS OF THE 49TH ANNUAL IEEE SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, 2008, : 293 - +
  • [6] Leakage-Resilient Symmetric Cryptography under Empirically Verifiable Assumptions
    Standaert, Francois-Xavier
    Pereira, Olivier
    Yu, Yu
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2013, PT I, 2013, 8042 : 335 - 352
  • [7] New Developments in Leakage-Resilient Cryptography
    Vaikuntanathan, Vinod
    [J]. PUBLIC KEY CRYPTOGRAPHY - PKC 2011, 2011, 6571 : 283 - 283
  • [8] Practical Leakage-Resilient Symmetric Cryptography
    Faust, Sebastian
    Pietrzak, Krzysztof
    Schipper, Joachim
    [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2012, 2012, 7428 : 213 - 232
  • [9] Leakage-Resilient Cryptography from the Inner-Product Extractor
    Dziembowski, Stefan
    Faust, Sebastian
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2011, 2011, 7073 : 702 - +
  • [10] Leakage-Resilient Circuits without Computational Assumptions
    Dziembowski, Stefan
    Faust, Sebastian
    [J]. THEORY OF CRYPTOGRAPHY (TCC 2012), 2012, 7194 : 230 - 247