Parallel Repetition for Leakage Resilience Amplification Revisited

نویسندگان

  • Abhishek Jain
  • Krzysztof Pietrzak
چکیده

If a cryptographic primitive remains secure even if bits about the secret key are leaked to the adversary, one would expect that at least one of n independent instantiations of the scheme remains secure given n · bits of leakage. This intuition has been proven true for schemes satisfying some special information-theoretic properties by Alwen et al. [Eurocrypt’10]. On the negative side, Lewko and Waters [FOCS’10] construct a CPA secure public-key encryption scheme for which this intuition fails. The counterexample of Lewko and Waters leaves open the interesting possibility that for any scheme there exists a constant c > 0, such that n fold repetition remains secure against c·n· bits of leakage. Furthermore, their counterexample requires the n copies of the encryption scheme to share a common reference parameter, leaving open the possibility that the intuition is true for all schemes without common setup. In this work we give a stronger counterexample ruling out these possibilities. We construct a signature scheme such that: 1. a single instantiation remains secure given = log(k) bits of leakage where k is a security parameter. 2. any polynomial number of independent instantiations can be broken (in the strongest sense of key-recovery) given ′ = poly(k) bits of leakage. Note that ′ does not depend on the number of instances. The computational assumption underlying our counterexample is that non-interactive computationally sound proofs exist. Moreover, under a stronger (non-standard) assumption about such proofs, our counterexample does not require a common reference parameter. The underlying idea of our counterexample is rather generic and can be applied to other primitives like encryption schemes.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Parallel Repetition Theorem for Leakage Resilience

A leakage resilient encryption scheme is one which stays secure even against an attacker that obtains a bounded amount of side information on the secret key (say λ bits of “leakage”). A fundamental question is whether parallel repetition amplifies leakage resilience. Namely, if we secret share our message, and encrypt the shares under two independent keys, will the resulting scheme be resilient...

متن کامل

Efficient Parallel Repetition Theorems with Applications to Security Amplification

This thesis focuses on establishing efficient parallel repetition theorems for computationally sound protocols, which assert that under parallel repetition, the computational soundness error of interactive protocols decreases at an exponential rate, and ideally, behaves as if the repetitions are completely independent. For example, suppose a protocol 〈P,V〉 has soundness error δ, then its n-fold...

متن کامل

On Generic Constructions of Circularly-Secure, Leakage-Resilient Public-Key Encryption Schemes

We propose generic constructions of public-key encryption schemes, satisfying key-dependent message (KDM) security for projections and different forms of key-leakage resilience, from CPA-secure private-key encryption schemes with two main abstract properties: (1) a form of (additive) homomorphism with respect to both plaintexts and randomness, and (2) reproducibility, providing a means for reus...

متن کامل

Classical leakage resilience from fault-tolerant quantum computation

Physical implementations of cryptographic algorithms leak information, which makes them vulnerable to so-called side-channel attacks. The problem of secure computation in the presence of leakage is generally known as leakage resilience. In this work, we establish a connection between leakage resilience and fault-tolerant quantum computation. We first prove that for a general leakage model, ther...

متن کامل

Parallel Repetition via Fortification: Analytic View and the Quantum Case

In a recent work, Moshkovitz [FOCS ’14] presented a transformation on two-player games called “fortification”, and gave an elementary proof of an (exponential decay) parallel repetition theorem for fortified two-player projection games. In this paper, we give an analytic reformulation of Moshkovitz’s fortification framework, which was originally cast in combinatorial terms. This reformulation a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011