Back to Search Start Over

Leakage resilient one-way functions: The auxiliary-input setting.

Authors :
Komargodski, Ilan
Source :
Theoretical Computer Science. Oct2018, Vol. 746, p6-18. 13p.
Publication Year :
2018

Abstract

Abstract Most cryptographic schemes are designed in a model where perfect secrecy of the secret key is assumed. In most physical implementations, however, some form of information leakage is inherent and unavoidable. To deal with this, a flurry of works showed how to construct basic cryptographic primitives that are resilient to various forms of leakage. Dodis et al. (FOCS '10) formalized and constructed leakage resilient one-way functions. These are one-way functions f such that given a random image f (x) and leakage g (x) it is still hard to invert f (x). Based on any one-way function, Dodis et al. constructed such a one-way function that is leakage resilient assuming that an attacker can leak any lossy function g of the input. In this work we consider the problem of constructing leakage resilient one-way functions that are secure with respect to arbitrary computationally hiding leakage (a.k.a. auxiliary-input). We consider both types of leakage – selective and adaptive – and prove various possibility and impossibility results. On the negative side, we show that if the leakage is an adaptively-chosen arbitrary one-way function, then it is impossible to construct leakage resilient one-way functions. The latter is proved both in the random oracle model (without any further assumptions) and in the standard model based on a strong vector-variant of DDH. On the positive side, we observe that when the leakage is chosen ahead of time, there are leakage resilient one-way functions based on a variety of assumption. [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISSN :
03043975
Volume :
746
Database :
Academic Search Index
Journal :
Theoretical Computer Science
Publication Type :
Academic Journal
Accession number :
131658361
Full Text :
https://doi.org/10.1016/j.tcs.2018.06.014