Leakage-Resilient Zero Knowledge
Abhishek Jain Amit Sahai Sanjam Garg
Leakage-Resilient Zero Knowledge Sanjam Garg Abhishek Jain Amit - - PowerPoint PPT Presentation
Leakage-Resilient Zero Knowledge Sanjam Garg Abhishek Jain Amit Sahai Leakage-Resilient Cryptography Traditional Cryptography: adv has only black-box access to a cryptosystem I O LR-Cryptography: open the black-box more
Abhishek Jain Amit Sahai Sanjam Garg
access to a cryptosystem
I O
ϕ
FKPR10, DGKPV10, ADNGWW10, DHLW10, BKKV10, LRW11, MTVY11, BSW11, LLW11, DLWW12…]
This work: Leakage on entire state of honest party during protocol execution
X Verifier learns nothing beyond validity of X
(For every V, there exists S that “simulates” the view of V)
Verifier learns something beyond validity of X X
f f(state)
Can not be achieved.
protocol
Cannot achieve standard ZK guarantee since simulator cannot simulate leakage queries on the witness
X
f f(state)
Ideal
w
Real
f’ f’(w)
w
fi fi(state) Ideal w
Real fi’ fi’(w)
How much leakage in the ideal world?
X and leakage information
leaked information
is not a new concept
attacks
answers to leakage queries
leakage queries of V
(based on general assumptions)
impossible)
protocol exec
in the “leaky token model”
leakage) model − Recently constructed by [MTVY11, BSW11, LLW11] − Our scheme also secure in “noisy leakage” model − All prior works require completely leakage-resilient tokens
f f(state) w
f f(state) = state w
Adaptive Security!
consistent with transcript and honest P strategy
(otherwise binding)
1 1 0 1 0 0 1 0 0 1 0 1 1 0 1 0 1 1 0 1 0 0 1 0 0 1 0 1 1 0 1 0 0 0 1 0 1 0 1 0 0 1 0 1 1 1 0 0 1 1 0 1 0 0 1 0 0 1 0 1 1 0 1 0 * * * * * * * * * * * * * * * * * * 1 * 1 * * * * * * 1 * 1 * * * * * * * * * * * * * * * * * *
b b = 0?
0 0 1 0 1 0 1 0 0 1 0 1 1 1 0 0
b = 1?
COM
1 1 0 1 0 0 1 0 0 1 0 1 1 0 1 0 1 1 0 1 0 0 1 0 0 1 0 1 1 0 1 0 0 0 1 0 1 0 1 0 0 1 0 1 1 1 0 0 1 1 0 1 0 0 1 0 0 1 0 1 1 0 1 0 * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
b
0 * * * * * * * * * * * * * * * 1 * * * * * * * * * * * * * * * Eq-COM
(w) S does not know ‘b’. Answer must be consistent with ‘b’ f
leakage query
A NIZK proof with “adaptive security” [GOS06] is also a LR-NIZK proof system
(GOS NIZK proof system is leakage-resilient)