On the Connection between Leakage Tolerance and Adaptive Security.

作者: Angela Zottarel , Daniele Venturi , Jesper Buus Nielsen

DOI:

关键词:

摘要: We revisit the context of leakage-tolerant interactive protocols as defined by Bitanski, Canetti and Halevi (TCC 2012). Our contributions can be summarized follows: For purpose secure message transmission, any encryption protocol with spaceM secret key spaceSK tolerating poly-logarithmic leakage on state receiver must satisfyjSKj (1 )jMj, for every 0 < 1, ifjSKj =jMj, then scheme use a fresh pair to encrypt each message. More generally, we show that anyn party tolerates poly(log ) bits from one at end execution, if only has passive adaptive security against an corruption execution. This shows soon little is tolerated, needs full security. All our results based assumption collision-resistant function ensembles exist.

参考文章(47)
Jesper Buus Nielsen, Daniele Venturi, Angela Zottarel, Leakage-Resilient Signatures with Graceful Degradation public key cryptography. pp. 362- 379 ,(2014) , 10.1007/978-3-642-54631-0_21
Leonid Reyzin, Silvio Micali, Physically Observable Cryptography (Extended Abstract). theory of cryptography conference. pp. 278- 296 ,(2004)
Özgür Dagdelen, Daniele Venturi, A Second Look at Fischlin’s Transformation international conference on cryptology in africa. pp. 356- 376 ,(2014) , 10.1007/978-3-319-06734-6_22
Sebastian Faust, Markulf Kohlweiss, Giorgia Azzurra Marson, Daniele Venturi, On the Non-malleability of the Fiat-Shamir Transform Lecture Notes in Computer Science. pp. 60- 79 ,(2012) , 10.1007/978-3-642-34931-7_5
Stefan Dziembowski, Sebastian Faust, Leakage-Resilient circuits without computational assumptions theory of cryptography conference. pp. 230- 247 ,(2012) , 10.1007/978-3-642-28914-9_13
Abhishek Jain, Krzysztof Pietrzak, Parallel repetition for leakage resilience amplification revisited theory of cryptography conference. pp. 58- 69 ,(2011) , 10.1007/978-3-642-19571-6_5
Sebastian Faust, Eike Kiltz, Krzysztof Pietrzak, Guy N. Rothblum, Leakage-resilient signatures theory of cryptography conference. pp. 343- 360 ,(2010) , 10.1007/978-3-642-11799-2_21
Mihir Bellare, Oded Goldreich, On Defining Proofs of Knowledge international cryptology conference. pp. 390- 420 ,(1992) , 10.1007/3-540-48071-4_28
R. Canetti, Universally composable security: a new paradigm for cryptographic protocols international conference on cluster computing. pp. 136- 145 ,(2001) , 10.1109/SFCS.2001.959888
Yevgeniy Dodis, Kristiyan Haralambiev, Adriana López-Alt, Daniel Wichs, Efficient public-key cryptography in the presence of key leakage international conference on the theory and application of cryptology and information security. pp. 613- 631 ,(2010) , 10.1007/978-3-642-17373-8_35