Parallel Repetition for Leakage Resilience Amplification Revisited
نویسندگان
چکیده
If a cryptographic primitive remains secure even if bits about the secret key are leaked to the adversary, one would expect that at least one of n independent instantiations of the scheme remains secure given n · bits of leakage. This intuition has been proven true for schemes satisfying some special information-theoretic properties by Alwen et al. [Eurocrypt’10]. On the negative side, Lewko and Waters [FOCS’10] construct a CPA secure public-key encryption scheme for which this intuition fails. The counterexample of Lewko and Waters leaves open the interesting possibility that for any scheme there exists a constant c > 0, such that n fold repetition remains secure against c·n· bits of leakage. Furthermore, their counterexample requires the n copies of the encryption scheme to share a common reference parameter, leaving open the possibility that the intuition is true for all schemes without common setup. In this work we give a stronger counterexample ruling out these possibilities. We construct a signature scheme such that: 1. a single instantiation remains secure given = log(k) bits of leakage where k is a security parameter. 2. any polynomial number of independent instantiations can be broken (in the strongest sense of key-recovery) given ′ = poly(k) bits of leakage. Note that ′ does not depend on the number of instances. The computational assumption underlying our counterexample is that non-interactive computationally sound proofs exist. Moreover, under a stronger (non-standard) assumption about such proofs, our counterexample does not require a common reference parameter. The underlying idea of our counterexample is rather generic and can be applied to other primitives like encryption schemes.
منابع مشابه
A Parallel Repetition Theorem for Leakage Resilience
A leakage resilient encryption scheme is one which stays secure even against an attacker that obtains a bounded amount of side information on the secret key (say λ bits of “leakage”). A fundamental question is whether parallel repetition amplifies leakage resilience. Namely, if we secret share our message, and encrypt the shares under two independent keys, will the resulting scheme be resilient...
متن کاملEfficient Parallel Repetition Theorems with Applications to Security Amplification
This thesis focuses on establishing efficient parallel repetition theorems for computationally sound protocols, which assert that under parallel repetition, the computational soundness error of interactive protocols decreases at an exponential rate, and ideally, behaves as if the repetitions are completely independent. For example, suppose a protocol 〈P,V〉 has soundness error δ, then its n-fold...
متن کاملOn Generic Constructions of Circularly-Secure, Leakage-Resilient Public-Key Encryption Schemes
We propose generic constructions of public-key encryption schemes, satisfying key-dependent message (KDM) security for projections and different forms of key-leakage resilience, from CPA-secure private-key encryption schemes with two main abstract properties: (1) a form of (additive) homomorphism with respect to both plaintexts and randomness, and (2) reproducibility, providing a means for reus...
متن کاملClassical leakage resilience from fault-tolerant quantum computation
Physical implementations of cryptographic algorithms leak information, which makes them vulnerable to so-called side-channel attacks. The problem of secure computation in the presence of leakage is generally known as leakage resilience. In this work, we establish a connection between leakage resilience and fault-tolerant quantum computation. We first prove that for a general leakage model, ther...
متن کاملParallel Repetition via Fortification: Analytic View and the Quantum Case
In a recent work, Moshkovitz [FOCS ’14] presented a transformation on two-player games called “fortification”, and gave an elementary proof of an (exponential decay) parallel repetition theorem for fortified two-player projection games. In this paper, we give an analytic reformulation of Moshkovitz’s fortification framework, which was originally cast in combinatorial terms. This reformulation a...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2011