TY - CHAP
T1 - Private Circuits: A Modular Approach
T2 - 38th Annual International Cryptology Conference, CRYPTO 2018
AU - Ananth, Prabhanjan
AU - Ishai, Yuval
AU - Sahai, Amit
N1 - Publisher Copyright: © International Association for Cryptologic Research 2018.
PY - 2018
Y1 - 2018
N2 - We consider the problem of protecting general computations against constant-rate random leakage. That is, the computation is performed by a randomized boolean circuit that maps a randomly encoded input to a randomly encoded output, such that even if the value of every wire is independently leaked with some constant probability p> 0, the leakage reveals essentially nothing about the input. In this work we provide a conceptually simple, modular approach for solving the above problem, providing a simpler and self-contained alternative to previous constructions of Ajtai (STOC 2011) and Andrychowicz et al. (Eurocrypt 2016). We also obtain several extensions and generalizations of this result. In particular, we show that for every leakage probability p< 1, there is a finite basis B such that leakage-resilient computation with leakage probability p can be realized using circuits over the basis B. We obtain similar positive results for the stronger notion of leakage tolerance, where the input is not encoded, but the leakage from the entire computation can be simulated given random p′ -leakage of input values alone, for any p< p′< 1. Finally, we complement this by a negative result, showing that for every basis B there is some leakage probability p< 1 such that for any p′< 1, leakage tolerance as above cannot be achieved in general. We show that our modular approach is also useful for protecting computations against worst case leakage. In this model, we require that leakage of any t (adversarially chosen) wires reveal nothing about the input. By combining our construction with a previous derandomization technique of Ishai et al. (ICALP 2013), we show that security in this setting can be achieved with O(t1+ε) random bits, for every constant ε> 0. This (near-optimal) bound significantly improves upon previous constructions that required more than t3 random bits.
AB - We consider the problem of protecting general computations against constant-rate random leakage. That is, the computation is performed by a randomized boolean circuit that maps a randomly encoded input to a randomly encoded output, such that even if the value of every wire is independently leaked with some constant probability p> 0, the leakage reveals essentially nothing about the input. In this work we provide a conceptually simple, modular approach for solving the above problem, providing a simpler and self-contained alternative to previous constructions of Ajtai (STOC 2011) and Andrychowicz et al. (Eurocrypt 2016). We also obtain several extensions and generalizations of this result. In particular, we show that for every leakage probability p< 1, there is a finite basis B such that leakage-resilient computation with leakage probability p can be realized using circuits over the basis B. We obtain similar positive results for the stronger notion of leakage tolerance, where the input is not encoded, but the leakage from the entire computation can be simulated given random p′ -leakage of input values alone, for any p< p′< 1. Finally, we complement this by a negative result, showing that for every basis B there is some leakage probability p< 1 such that for any p′< 1, leakage tolerance as above cannot be achieved in general. We show that our modular approach is also useful for protecting computations against worst case leakage. In this model, we require that leakage of any t (adversarially chosen) wires reveal nothing about the input. By combining our construction with a previous derandomization technique of Ishai et al. (ICALP 2013), we show that security in this setting can be achieved with O(t1+ε) random bits, for every constant ε> 0. This (near-optimal) bound significantly improves upon previous constructions that required more than t3 random bits.
UR - http://www.scopus.com/inward/record.url?scp=85052372467&partnerID=8YFLogxK
U2 - https://doi.org/10.1007/978-3-319-96878-0_15
DO - https://doi.org/10.1007/978-3-319-96878-0_15
M3 - فصل
SN - 978-3-319-96877-3
SN - 9783319968773
VL - 10993
T3 - Lecture Notes in Computer Science
SP - 427
EP - 455
BT - ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT III
A2 - Shacham, Hovav
A2 - Boldyreva, Alexandra
Y2 - 19 August 2018 through 23 August 2018
ER -