On the power of nonuniformity in proofs of security

Kai Min Chung, Huijia Lin, Mohammad Mahmoody, Rafael Pass

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Nonuniform proofs of security are common in cryptography, but traditional black-box separations consider only uniform security reductions. In this paper, we initiate a formal study of the power and limits of nonuniform black-box proofs of security. We first show that a known protocol (based on the existence of one-way permutations) that uses a nonuniform proof of security, and it cannot be proven secure through a uniform security reduction. Therefore, nonuniform proofs of security are indeed provably more powerful than uniform ones. We complement this result by showing that many known black-box separations in the uniform regime actually do extend to the nonuniform regime. We prove our results by providing general techniques for extending certain types of black-box separations to handle nonuniformity.

Original languageEnglish
Title of host publicationITCS 2013 - Proceedings of the 2013 ACM Conference on Innovations in Theoretical Computer Science
Pages389-400
Number of pages12
DOIs
StatePublished - 2013
Externally publishedYes
Event2013 4th ACM Conference on Innovations in Theoretical Computer Science, ITCS 2013 - Berkeley, CA, United States
Duration: 9 Jan 201312 Jan 2013

Publication series

NameITCS 2013 - Proceedings of the 2013 ACM Conference on Innovations in Theoretical Computer Science

Conference

Conference2013 4th ACM Conference on Innovations in Theoretical Computer Science, ITCS 2013
Country/TerritoryUnited States
CityBerkeley, CA
Period9/01/1312/01/13

Keywords

  • black-box separation
  • nonuniformity
  • proofs of security

All Science Journal Classification (ASJC) codes

  • Management of Technology and Innovation
  • Computer Science (miscellaneous)

Fingerprint

Dive into the research topics of 'On the power of nonuniformity in proofs of security'. Together they form a unique fingerprint.

Cite this