skip to main content
10.1145/2484389.2484393acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
research-article

Leakage-resilient lossy trapdoor functions and public-key encryption

Published: 08 May 2013 Publication History

Abstract

Lossy Trapdoor Functions (LTFs) was introduced by Peikert and Waters in 2008. The importance of the LTFs was justified by their numerous cryptographic applications, like the construction of injective one-way trapdoor functions, CCA-secure public-key encryption, etc. However, little research on application of LTFs to key-leakage resilient public-key encryption was done. In this article we introduce a new variant of LTFs featuring leakage-resilience, namely lrLTFs and give a realization of lrLTFs with leakage rate 1/Θ(κ) (where κ is the security parameter) under the Decisional Diffie-Hellman (DDH) assumption. We further improve the leakage rate to 1-o(1) over a composite-order group in which the Decisional Composite Residuosity (DCR) assumption holds. We also introduce a new notion of key-leakage attacks, which we call weak key-leakage attacks, for bridging the adaptive and non-adaptive key-leakage attacks in the setting of public-key cryptosystem. In this model, the leakage adversary only gets a part of public key before accessing to a leakage oracle. We show that lrLTFs imply public-key encryption schemes secure against chosen-ciphertext weak key-leakage attacks in a black-box sense.

References

[1]
A. Akavia, S. Goldwasser, and V. Vaikuntanathan. Simultaneous hardcore bits and cryptography against memory attacks. In O. Reingold, editor, TCC 2009, volume 5444 of LNCS, pages 474--495. Springer, 2009.
[2]
M. Bellare, D. Hofheinz, and S. Yilek. Possibility and impossibility results for encryption and commitment secure under selective opening. In Joux {17}, pages 1--35.
[3]
D. Boneh, S. Halevi, M. Hamburg, and R. Ostrovsky. Circular-secure encryption from decision diffie-hellman. In Wagner {30}, pages 108--125.
[4]
L. Carter and M. N. Wegman. Universal classes of hash functions. J. Comput. Syst. Sci., 18(2):143--154, 1979.
[5]
R. Cramer and V. Shoup. Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption. In L. R. Knudsen, editor, EUROCRYPT 2002, volume 2332 of LNCS, pages 45--64. Springer, 2002.
[6]
R. Cramer and V. Shoup. Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack. SIAM J. Comput., 33(1):167--226, Jan. 2004.
[7]
I. Damgård and M. Jurik. A generalisation, a simplification and some applications of paillier's probabilistic public-key system. In K. Kim, editor, PKC 2001, volume 1992 of LNCS, pages 119--136. Springer, 2001.
[8]
Y. Dodis, K. Haralambiev, A. López-Alt, and D. Wichs. Cryptography against continuous memory attacks. In FOCS, pages 511--520. IEEE Computer Society, 2010.
[9]
Y. Dodis, R. Ostrovsky, L. Reyzin, and A. Smith. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. SIAM J. Comput., 38(1):97--139, 2008.
[10]
D. Dolev, C. Dwork, and M. Naor. Nonmalleable cryptography. SIAM J. Comput., 30(2):391--437, 2000.
[11]
C. Dwork, editor. Proceedings of the 40th Annual ACM Symposium on Theory of Computing, Victoria, British Columbia, Canada, May 17--20, 2008. ACM, 2008.
[12]
S. Dziembowski and K. Pietrzak. Leakage-resilient cryptography. In FOCS 2008, pages 293--302. IEEE Computer Society, 2008.
[13]
C. Gentry, C. Peikert, and V. Vaikuntanathan. Trapdoors for hard lattices and new cryptographic constructions. In Dwork {11}, pages 197--206.
[14]
S. Goldwasser, Y. T. Kalai, and G. N. Rothblum. One-time programs. In Wagner {30}, pages 39--56.
[15]
J. A. Halderman, S. D. Schoen, N. Heninger, W. Clarkson, W. Paul, J. A. Calandrino, A. J. Feldman, J. Appelbaum, and E. W. Felten. Lest we remember: Cold boot attacks on encryption keys. In P. C. van Oorschot, editor, USENIX Security Symposium, pages 45--60. USENIX Association, 2008.
[16]
B. Hemenway and R. Ostrovsky. Extended-ddh and lossy trapdoor functions. In M. Fischlin, J. Buchmann, and M. Manulis, editors, PKC 2012, volume 7293 of LNCS, pages 627--643. Springer, 2012.
[17]
A. Joux, editor. Advances in Cryptology - EUROCRYPT 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26--30, 2009. Proceedings, volume 5479 of LNCS. Springer, 2009.
[18]
E. Kiltz, P. Mohassel, and A. O'Neill. Adaptive trapdoor functions and chosen-ciphertext security. In H. Gilbert, editor, EUROCRYPT 2010, volume 6110 of LNCS, pages 673--692. Springer, 2010.
[19]
P. C. Kocher. Timing attacks on implementations of diffie-hellman, rsa, dss, and other systems. In N. Koblitz, editor, CRYPTO 1996, volume 1109 of LNCS, pages 104--113. Springer, 1996.
[20]
P. C. Kocher, J. Jaffe, and B. Jun. Differential power analysis. In M. J. Wiener, editor, CRYPTO 1999, volume 1666 of LNCS, pages 388--397. Springer, 1999.
[21]
S. Liu, J. Weng, and Y. Zhao. Efficient public key cryptosystem resilient to key leakage chosen ciphertext attacks. In E. Dawson, editor, CT-RSA 2013, volume 7779 of LNCS, pages 84--100. Springer, 2013.
[22]
S. Micali and L. Reyzin. Physically observable cryptography (extended abstract). In M. Naor, editor, TCC 2004, volume 2951 of LNCS, pages 278--296. Springer, 2004.
[23]
M. Naor and G. Segev. Public-key cryptosystems resilient to key leakage. In S. Halevi, editor, CRYPTO 2009, volume 5677 of LNCS, pages 18--35. Springer, 2009.
[24]
M. Naor and M. Yung. Public-key cryptosystems provably secure against chosen ciphertext attacks. In H. Ortiz, editor, STOC 1990, pages 427--437. ACM, 1990.
[25]
P. Paillier. Public-key cryptosystems based on composite degree residuosity classes. In J. Stern, editor, EUROCRYPT 1999, volume 1592 of LNCS, pages 223--238. Springer, 1999.
[26]
C. Peikert and B. Waters. Lossy trapdoor functions and their applications. In Dwork {11}, pages 187--196.
[27]
C. Petit, F.-X. Standaert, O. Pereira, T. Malkin, and M. Yung. A block cipher based pseudo random number generator secure against side-channel key recovery. In M. Abe and V. D. Gligor, editors, ASIACCS 2008, pages 56--65. ACM, 2008.
[28]
K. Pietrzak. A leakage-resilient mode of operation. In Joux {17}, pages 462--482.
[29]
O. Regev. On lattices, learning with errors, random linear codes, and cryptography. In H. N. Gabow and R. Fagin, editors, STOC 2005, pages 84--93. ACM, 2005.
[30]
D. Wagner, editor. Advances in Cryptology - CRYPTO 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17--21, 2008. Proceedings, volume 5157 of LNCS. Springer, 2008.
[31]
H. Wee. Dual projective hashing and its applications - lossy trapdoor functions and more. In D. Pointcheval and T. Johansson, editors, EUROCRYPT 2012, volume 7237 of LNCS, pages 246--262. Springer, 2012.

Cited By

View all

Index Terms

  1. Leakage-resilient lossy trapdoor functions and public-key encryption

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    AsiaPKC '13: Proceedings of the first ACM workshop on Asia public-key cryptography
    May 2013
    70 pages
    ISBN:9781450320696
    DOI:10.1145/2484389
    • General Chairs:
    • Kefei Chen,
    • Qi Xie,
    • Weidong Qiu,
    • Program Chairs:
    • Shouhuai Xu,
    • Yunlei Zhao
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 08 May 2013

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. chosen-ciphertext security
    2. leakage-resilience
    3. lossy trapdoor functions
    4. public-key encryption

    Qualifiers

    • Research-article

    Conference

    ASIA CCS '13
    Sponsor:

    Acceptance Rates

    AsiaPKC '13 Paper Acceptance Rate 8 of 18 submissions, 44%;
    Overall Acceptance Rate 36 of 103 submissions, 35%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)5
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 10 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media