Skip to main navigation Skip to search Skip to main content

Unprovability of leakage-resilient cryptography beyond the information-theoretic limit

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

In recent years, leakage-resilient cryptography—the design of cryptographic protocols resilient to bounded leakage of honest players’ secrets—has received significant attention. A major limitation of known provably-secure constructions (based on polynomial hardness assumptions) is that they require the secrets to have sufficient actual (i.e., information-theoretic), as opposed to comptutational, min-entropy even after the leakage. In this work, we present barriers to provably-secure constructions beyond the “information-theoretic barrier”: Assume the existence of collision-resistant hash functions. Then, no $$\mathcal{NP}$$ search problem with $$(2^{n^{\epsilon }})$$-bounded number of witnesses can be proven (even worst-case) hard in the presence of $$O(n^{\epsilon })$$ bits of computationally-efficient leakage of the witness, using a black-box reduction to any O(1)-round assumption. In particular, this implies that $$O(n^{\epsilon })$$-leakage resilient injective one-way functions, and more generally, one-way functions with at most $$2^{n^{\epsilon }}$$ pre-images, cannot be based on any “standard” complexity assumption using a black-box reduction.

Original languageEnglish
Title of host publicationSecurity and Cryptography for Networks - 12th International Conference, SCN 2020, Proceedings
EditorsClemente Galdi, Vladimir Kolesnikov
PublisherSpringer Science and Business Media Deutschland GmbH
Pages621-642
Number of pages22
ISBN (Print)9783030579890
DOIs
StatePublished - 2020
Externally publishedYes
Event12th International Conference on Security and Cryptography for Networks, SCN 2020 - Amalfi, Italy
Duration: 14 Sep 202016 Sep 2020

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume12238 LNCS

Conference

Conference12th International Conference on Security and Cryptography for Networks, SCN 2020
Country/TerritoryItaly
CityAmalfi
Period14/09/2016/09/20

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'Unprovability of leakage-resilient cryptography beyond the information-theoretic limit'. Together they form a unique fingerprint.

Cite this