Fully Leakage-Resilient Codes

作者: Antonio Faonio , Jesper Buus Nielsen

DOI: 10.1007/978-3-662-54365-8_14

关键词:

摘要: Leakage resilient codes (LRCs) are probabilistic encoding schemes that guarantee message hiding even under some bounded leakage on the codeword. We introduce notion of fully (FLRCs), where adversary can leak \(\lambda _0\) bits from process, namely, and randomness involved during process. In addition as usual give a simulation-based definition requiring adversary’s process codeword be simulated given just message. fairly general impossibility result for FLRCs in popular split-state model, is broken into independent parts occurs independently parts. then two feasibility results weaker models. First, we show \(\mathsf {NC}^0\)-bounded arbitrary poly-time inner-product construction proposed by Davi et al. (SCN’10) successively improved Dziembowski Faust (ASIACRYPT’11) FLRC model. Second, provide compiler any LRC to common reference string model comes fixed family small cardinality. particular, this applies but also other

参考文章(50)
Stefan Heyse, Eike Kiltz, Vadim Lyubashevsky, Christof Paar, Krzysztof Pietrzak, Lapin: an efficient authentication protocol based on Ring-LPN fast software encryption. ,vol. 7549, pp. 346- 365 ,(2012) , 10.1007/978-3-642-34047-5_20
Zahra Jafargholi, Daniel Wichs, Tamper Detection and Continuous Non-malleable Codes Theory of Cryptography. pp. 451- 480 ,(2015) , 10.1007/978-3-662-46494-6_19
Jesper Buus Nielsen, Daniele Venturi, Angela Zottarel, Leakage-Resilient Signatures with Graceful Degradation public key cryptography. pp. 362- 379 ,(2014) , 10.1007/978-3-642-54631-0_21
Leonid Reyzin, Silvio Micali, Physically Observable Cryptography (Extended Abstract). theory of cryptography conference. pp. 278- 296 ,(2004)
Silvio Micali, Leonid Reyzin, Physically observable cryptography theory of cryptography conference. pp. 278- 296 ,(2004) , 10.1007/978-3-540-24638-1_16
Sanjam Garg, Craig Gentry, Shai Halevi, Daniel Wichs, On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with Auxiliary Input Advances in Cryptology – CRYPTO 2014. ,vol. 2013, pp. 518- 535 ,(2014) , 10.1007/978-3-662-44371-2_29
Rafail Ostrovsky, Giuseppe Persiano, Ivan Visconti, Impossibility of Black-Box Simulation Against Leakage Attacks international cryptology conference. pp. 130- 149 ,(2015) , 10.1007/978-3-662-48000-7_7
Elette Boyle, Kai-Min Chung, Rafael Pass, On Extractability Obfuscation Theory of Cryptography. pp. 52- 73 ,(2014) , 10.1007/978-3-642-54242-8_3
Tal Malkin, Isamu Teranishi, Yevgeniy Vahlis, Moti Yung, Signatures resilient to continual leakage on memory and computation theory of cryptography conference. pp. 89- 106 ,(2011) , 10.1007/978-3-642-19571-6_7
Omkant Pandey, Achieving Constant Round Leakage-Resilient Zero-Knowledge Theory of Cryptography. pp. 146- 166 ,(2014) , 10.1007/978-3-642-54242-8_7