Regular Lossy Functions and Applications in Leakage-Resilient Cryptography
Yu Chen1 Baodong Qin2 Haiyang Xue1
1SKLOIS, IIE, Chinese Academy of Sciences 2Xi’an University of Posts and Telecommunication
CT-RSA 2018 April 20th, 2018
1 / 41
Regular Lossy Functions and Applications in Leakage-Resilient - - PowerPoint PPT Presentation
Regular Lossy Functions and Applications in Leakage-Resilient Cryptography CT-RSA 2018 April 20th, 2018 1 / 41 Yu Chen 1 Baodong Qin 2 Haiyang Xue 1 1 SKLOIS, IIE, Chinese Academy of Sciences 2 Xian University of Posts and Telecommunication
1SKLOIS, IIE, Chinese Academy of Sciences 2Xi’an University of Posts and Telecommunication
1 / 41
1 Backgrounds 2 Regular Lossy Functions 3 Constructions of ABO RLFs
4 Applications of RLFs
2 / 41
1 Backgrounds 2 Regular Lossy Functions 3 Constructions of ABO RLFs
4 Applications of RLFs
3 / 41
4 / 41
ek
5 / 41
6 / 41
7 / 41
7 / 41
7 / 41
7 / 41
7 / 41
8 / 41
8 / 41
9 / 41
9 / 41
1 Backgrounds 2 Regular Lossy Functions 3 Constructions of ABO RLFs
4 Applications of RLFs
10 / 41
11 / 41
11 / 41
11 / 41
11 / 41
12 / 41
13 / 41
13 / 41
13 / 41
13 / 41
14 / 41
1 Backgrounds 2 Regular Lossy Functions 3 Constructions of ABO RLFs
4 Applications of RLFs
15 / 41
V
16 / 41
2
V
16 / 41
2
V
16 / 41
2
16 / 41
2
16 / 41
2
16 / 41
2
16 / 41
2
2 (a.k.a. {0, 1}n)
16 / 41
p
V
17 / 41
p
2
V
17 / 41
p
2
17 / 41
N3|
N2|
18 / 41
19 / 41
19 / 41
1 Let
2 For each
20 / 41
1 Let
2 For each
20 / 41
1 Let ¯
2 For each x ∈ L, ia + x /
20 / 41
21 / 41
21 / 41
R
22 / 41
R
22 / 41
0, b∗ 1 ∈ Zp:
0a + x) ≈c (b∗ 0a + u) ≡ (b∗ 1a + u) ≈c (b∗ 1a + x)
R
22 / 41
1 Backgrounds 2 Regular Lossy Functions 3 Constructions of ABO RLFs
4 Applications of RLFs
23 / 41
leakage proof black-box leakage prone leakage attacks (since 1996) invalidate this idealized assumption
24 / 41
leakage proof black-box leakage prone leakage attacks (since 1996) invalidate this idealized assumption
24 / 41
leakage proof black-box leakage prone leakage attacks (since 1996) invalidate this idealized assumption
24 / 41
leakage proof black-box leakage prone leakage attacks (since 1996) invalidate this idealized assumption
24 / 41
leakage proof black-box leakage prone leakage attacks (since 1996) invalidate this idealized assumption
24 / 41
leakage proof black-box leakage prone leakage attacks (since 1996) invalidate this idealized assumption
24 / 41
leakage proof black-box leakage prone leakage attacks (since 1996) invalidate this idealized assumption
24 / 41
leakage proof black-box leakage prone leakage attacks (since 1996) invalidate this idealized assumption
24 / 41
leakage proof black-box leakage prone leakage attacks (since 1996) invalidate this idealized assumption
24 / 41
leakage proof black-box leakage prone leakage attacks (since 1996) invalidate this idealized assumption
24 / 41
25 / 41
R
26 / 41
R
26 / 41
R
26 / 41
R
26 / 41
R
26 / 41
R
26 / 41
1 Setup: CH generates f ← RLF.GenNormal(λ), picks x∗ R
2 Leakage queries: A ֒
3 Invert: A outputs x and wins if x = x∗.
1 Setup: CH generates f ← RLF.GenLossy(λ) .
27 / 41
28 / 41
28 / 41
28 / 41
28 / 41
28 / 41
28 / 41
28 / 41
28 / 41
28 / 41
28 / 41
R
29 / 41
R
29 / 41
R
29 / 41
R
29 / 41
1 Setup: A ↬ m∗, CH generates ek ← ABORLF.Gen(λ, 0d), picks k R
2 Leakage queries: A ↬ gi, CH responds with gi(k). 3 Forge: A → (m, t) and wins if m ̸= m∗ ∧ t = fek,m(k).
30 / 41
1 Setup: CH generates ek ← ABORLF.Gen(λ, m∗) .
31 / 41
R R
32 / 41
R R
32 / 41
R R
32 / 41
R R
32 / 41
R R
32 / 41
R R
32 / 41
0) ← Encap(pk)
1
R
R
β)
32 / 41
0) ← Encap(pk)
1
R
R
β)
32 / 41
0) ← Encap(pk)
1
R
R
β)
32 / 41
R
33 / 41
R
33 / 41
R
33 / 41
R
33 / 41
1 Setup: CH generates (pk, sk) ← HPS.Gen(λ), ek ← ABORLF.Gen(λ, 0m+d),
2 Leakage queries ⟨gi⟩: CH responds with gi(sk). 3 Challenge: CH picks β ∈ {0, 1}, s∗ ← {0, 1}d, (x∗, w∗) ← SampYes(λ),
0 ← ext(π∗, s∗), picks
1 ← {0, 1}κ, sends c∗ = (x∗, s∗, t∗) and k∗ β to A
4 Decaps queries ⟨c = (x, s, t) ̸= c∗⟩: CH computes π ← Λsk(x), output
34 / 41
35 / 41
35 / 41
35 / 41
35 / 41
35 / 41
β)
36 / 41
0 ← {0, 1}κ rather than k∗ 0 ← ext(Λsk(x∗)). Next, we
5,0), (view′, k∗ 6,0)] ≤ ϵ2.
5,0) and (view′, k∗ 6,0) resp.
37 / 41
38 / 41
38 / 41
39 / 41
39 / 41
39 / 41
39 / 41
39 / 41
39 / 41
40 / 41
[FGK+13] David Mandell Freeman, Oded Goldreich, Eike Kiltz, Alon Rosen, and Gil Segev. More constructions of lossy and correlation-secure trapdoor functions. J. Cryptology, 26(1):39–74, 2013. [PW08] Chris Peikert and Brent Waters. Lossy trapdoor functions and their applications. In Proceedings of the 40th Annual ACM Symposium on Theory of Computing, STOC 2008, pages 187–196. ACM, 2008.
41 / 41