One-time Computable and Uncomputable Functions
نویسندگان
چکیده
This paper studies the design of cryptographic schemes that are secure even if implemented on untrusted machines, whose internals can be partially observed/controlled by an adversary. For example, this includes machines that are infected with a software virus. We introduce a new cryptographic notion that we call a one-time computable pseudorandom function (PRF), which is a PRF FK(·) that can be evaluated at most once on a machine which stores the (long) key K, as long as: (1) the adversary cannot retrieve the key K out of the machine completely (this is similar to the assumptions made in the so-called Bounded-Retrieval Model), and (2) the local read/write memory of the machine is restricted, and not too much larger than the size of K. In particular, the only way to evaluate FK(x) on such device, is to overwrite part of the key K, preventing all future evaluations of FK(·) at any other point x′ 6= x. We show that this primitive can be used to construct schemes for password protected storage that are secure against dictionary attacks, even by a virus that infects the machine. Our constructions rely on the random-oracle model, and lower-bounds for graphs pebbling problems. We show that our techniques can also be used to construct another primitive, that we call uncomputable hash functions, which are hash funcitons that cannot be computed if the local storage has some restricted size s, but can be computed if they are given slightly more storage than s. We show that this tool can be used to improve the communication complexity of proofs-of-erasure schemes, introduced recently by Perito and Tsudik (ESORICS 2010).
منابع مشابه
The Euclid Abstract Machine
Concrete non-computable functions are usually related to the halting function. Is it possible to present examples of non-computability, which are unrelated to the halting problem and its derivatives? We built an abstract machine based on the historic concept of compass and ruler constructions (a compass construction would suffice) which reveals the existence of non-computable functions not rela...
متن کاملYou Don't Need a Hypercomputer to Evaluate an Uncomputable Function
I believe the human mind can evaluate functions so uncomputable that no machine, not even a hypercomputer, can compute them. But I believe that computers can evaluate such functions too, because computers, like minds, have other ways to evaluate functions that go beyond computing. If we allow them to use these ways – or, as I shall put it, to uncompute – they may be able to do things that only ...
متن کاملWhy we shouldn’t fault Lucas and Penrose for continuing to believe in the Gödelian argument against computationalism - II
One reason why Lucas and Penrose should not be faulted for continuing to believe in their well-known Gödelian arguments against computationalism lies in the lack of an adequate consensus on the term ‘computation’. For instance, Boolos, Burgess and Jeffrey (2003: Computability and Logic, 4th ed. CUP, p37) define a diagonal function, d, any value of which can be computed effectively, although the...
متن کاملThe topological entropy of iterated piecewise affine maps is uncomputable
We show that it is impossible to compute (or even to approximate) the topological entropy of a continuous piecewise affine function in dimension four. The same result holds for saturated linear functions in unbounded dimension. We ask whether the topological entropy of a piecewise affine function is always a computable real number, and conversely whether every non-negative computable real numbe...
متن کاملThe Euclid Abstract Machine: Trisection of the Angle and the Halting Problem
What is the meaning of hypercomputation, the meaning of computing more than the Turing machine? Concrete non-computable functions always hide the halting problem as far as we know. Even the construction of a function that grows faster than any recursive function — the Busy Beaver — a more natural function, hides the halting function, that can easily be put in relation with the Busy Beaver. Is t...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2010 شماره
صفحات -
تاریخ انتشار 2010