The Complexity of Memory Checking with Covert Security

Elette Boyle, Ilan Komargodski, Neekon Vafa

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

A memory checker is an algorithmic tool used to certify the integrity of a database maintained on a remote, unreliable, computation-ally bounded server. Concretely, it allows a user to issue instructions to the server and after every instruction, obtain either the correct value or a failure (but not an incorrect answer) with high probability. A recent result due to Boyle, Komargodski, and Vafa (BKV, STOC’24) showed a tradeoff between the size of the local storage and the number of queries the memory checker makes to the server upon every logical instruction. Specifically, they show that every non-trivial memory checker construc-tion with inverse-polynomial soundness and local storage at most n1− must make Ω(log n/ log log n) queries, and this is tight up to constant factors given known constructions. However, an intriguing question is whether natural relaxations of the security guarantee could allow for more efficient constructions.

Original languageEnglish
Title of host publicationAdvances in Cryptology – EUROCRYPT 2025 - 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2025, Proceedings
EditorsSerge Fehr, Pierre-Alain Fouque
PublisherSpringer Science and Business Media Deutschland GmbH
Pages301-330
Number of pages30
ISBN (Print)9783031910913
DOIs
StatePublished - 2025
Event44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2025 - Madrid, Spain
Duration: 4 May 20258 May 2025

Publication series

NameLecture Notes in Computer Science
Volume15605 LNCS

Conference

Conference44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2025
Country/TerritorySpain
CityMadrid
Period4/05/258/05/25

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'The Complexity of Memory Checking with Covert Security'. Together they form a unique fingerprint.

Cite this