Robustness of the Learning with Errors Assumption Citation
نویسندگان
چکیده
Starting with the work of Ishai-Sahai-Wagner and Micali-Reyzin, a new goal has been set within the theory of cryptography community, to design cryptographic primitives that are secure against large classes of side-channel attacks. Recently, many works have focused on designing various cryptographic primitives that are robust (retain security) even when the secret key is “leaky”, under various intractability assumptions. In this work we propose to take a step back and ask a more basic question: which of our cryptographic assumptions (rather than cryptographic schemes) are robust in presence of leakage of their underlying secrets? Our main result is that the hardness of the learning with error (LWE) problem implies its hardness with leaky secrets. More generally, we show that the standard LWE assumption implies that LWE is secure even if the secret is taken from an arbitrary distribution with sufficient entropy, and even in the presence of hard-to-invert auxiliary inputs. We exhibit various applications of this result. 1. Under the standard LWE assumption, we construct a symmetric-key encryption scheme that is robust to secret key leakage, and more generally maintains security even if the secret key is taken from an arbitrary distribution with sufficient entropy (and even in the presence of hard-to-invert auxiliary inputs). 2. Under the standard LWE assumption, we construct a (weak) obfuscator for the class of point functions with multi-bit output. We note that in most schemes that are known to be robust to leakage, the parameters of the scheme depend on the maximum leakage the system can tolerate, and hence the efficiency degrades with the maximum anticipated leakage, even if no leakage occurs at all! In contrast, the fact that we rely on a robust assumption allows us to construct a single symmetric-key encryption scheme, with parameters that are independent of the anticipated leakage, that is robust to any leakage (as long as the secret key has sufficient entropy left over). Namely, for any k < n (where n is the size of the secret key), if the secret key has only entropy k, then the security relies on the LWE assumption with secret size roughly k.
منابع مشابه
بررسی وضعیت صحت مقالات استنادی پایان نامههای دورههای دکترای تخصصی پزشکی دانشگاه علوم پزشکی تهران
Background and Aim: Citation could be considered as basis of scientific researches. Each researcher will use citation to prove his scientific findings either to be in correspondence with truth or to familiarize readers with more references. Maintenance and continuation of informational link by citation is essential. Theses are not exceptional for this subject. This study was done to review the ...
متن کاملطراحی یک نمودار کنترل میانگین متحرک موزون نمایی پایدار با بازههای نمونهگیری متغیر برای کنترل تغییرات در میانگین فرآیند
The performance of an X-bar chart is usually studied under the assumption that the process standard deviation is well estimated and does not change. This is, of course, not always the case in practice and X-bar charts are not robust against errors in estimating the process standard deviation or changing standard deviation. In this paper, the use of an exponentially weighted moving average (EW...
متن کاملCommunicational Model of Organizational Learning Capabilities and Organizational Performance of Sport and Youth Offices of Iran's Northern Provinces
The purpose of this study was to determine the relationship between organizational learning capability and organizational performance in sport and youth offices of Iran's Northern provinces. Statistical population included of all managers, deputies and experts of the sport and youth offices in Iran's Northern provinces (Guilan, Mazandaran and Golestan) and managers and deputies from five select...
متن کاملDesign of Nonlinear Robust Controller and Observer for Control of a Flexible Spacecraft
Two robust nonlinear controllers along with a nonlinear observer have been developed in this study to control a 1D nonlinear flexible spacecraft. The first controller is based on dynamic inversion, while the second one is composed of dynamic inversion and µ-synthesis controllers. The extension of dynamic inversion approach to flexible spacecraft is impeded by the non-minimum phase characteristi...
متن کاملShift of “Certainty” in Pre- and Post-Citation Arguments: The Case of Textbooks in Applied Linguistics
Writing academic texts by novice researchers requires a framework and support by learning how to cite the works of others. However, compared to the studies on other academic writings, studying citations by considering certainty markers has received little attention. The main purpose of this study was to investigate the shifts of certainty markers (hedges and boosters) in pre- and post-citation ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2009