Regular lossy functions and their applications in leakage-resilient cryptography

In STOC 2008, Peikert and Waters introduced a powerful primitive called lossy trapdoor functions (LTFs). In a nutshell, LTFs are functions that behave in one of two modes. In the normal mode, functions are injective and invertible with a trapdoor. In the lossy mode, functions statistically lose info...

Full description

Saved in:
Bibliographic Details
Main Authors: CHEN, Yu, QIN, Baodong, XUE, Haiyang
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2018
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/9200
https://ink.library.smu.edu.sg/context/sis_research/article/10205/viewcontent/1_s2.0_S0304397518302937_main.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-10205
record_format dspace
spelling sg-smu-ink.sis_research-102052024-08-13T05:11:28Z Regular lossy functions and their applications in leakage-resilient cryptography CHEN, Yu QIN, Baodong XUE, Haiyang In STOC 2008, Peikert and Waters introduced a powerful primitive called lossy trapdoor functions (LTFs). In a nutshell, LTFs are functions that behave in one of two modes. In the normal mode, functions are injective and invertible with a trapdoor. In the lossy mode, functions statistically lose information about their inputs. Moreover, the two modes are computationally indistinguishable. In this work, we put forward a relaxation of LTFs, namely, regular lossy functions (RLFs). Compared to LTFs, the functions in the normal mode are not required to be efficiently invertible or even unnecessary to be injective. Instead, they could also be lossy, but in a regular manner. We also put forward richer abstractions of RLFs, namely all-but-one regular lossy functions (ABO-RLFs) and one-time regular lossy filters (OT-RLFs). We show that (ABO)-RLFs admit efficient constructions from both a variety of numbertheoretic assumptions and hash proof system (HPS) for subset membership problems satisfying natural algebraic properties. Thanks to the relaxations on functionality, the constructions enjoy much compact key size and better computational efficiency than that of (ABO)-LTFs. We demonstrate the utility of RLFs and their extensions in the leakage-resilient cryptography. • As a special case of RLFs, lossy functions imply leakage-resilient injective one-way functions with optimal leakage rate 1 −o(1). • ABO-RLFs (or OT-RLFs) immediately imply leakage-resilient one-time message authentication code (MAC) with optimal leakage rate 1 −o(1). • ABO-RLFs together with HPS give rise to leakage-resilient chosen-ciphertext (CCA) secure key encapsulation mechanisms (KEM) (this approach extends naturally to the identity-based setting). Combining the construction of ABO-RLFs from HPS, this gives the first leakage-resilient CCA-secure public-key encryption (PKE) with optimal leakage rate based solely on HPS, and thus goes beyond the barrier posed by Dodis et al. (Asiacrypt 2010). Our construction also applies to the identity-based setting, yielding LR-CCA secure IB-KEM with higher leakage rate than previous works. 2018-08-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/9200 info:doi/10.1016/j.tcs.2018.04.043 https://ink.library.smu.edu.sg/context/sis_research/article/10205/viewcontent/1_s2.0_S0304397518302937_main.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Regular lossy functions Hash proof system Leakage resilience One-way functions Message authentication codes (Identity-based) key encapsulation mechanism Information Security
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic Regular lossy functions
Hash proof system
Leakage resilience
One-way functions
Message authentication codes
(Identity-based) key encapsulation mechanism
Information Security
spellingShingle Regular lossy functions
Hash proof system
Leakage resilience
One-way functions
Message authentication codes
(Identity-based) key encapsulation mechanism
Information Security
CHEN, Yu
QIN, Baodong
XUE, Haiyang
Regular lossy functions and their applications in leakage-resilient cryptography
description In STOC 2008, Peikert and Waters introduced a powerful primitive called lossy trapdoor functions (LTFs). In a nutshell, LTFs are functions that behave in one of two modes. In the normal mode, functions are injective and invertible with a trapdoor. In the lossy mode, functions statistically lose information about their inputs. Moreover, the two modes are computationally indistinguishable. In this work, we put forward a relaxation of LTFs, namely, regular lossy functions (RLFs). Compared to LTFs, the functions in the normal mode are not required to be efficiently invertible or even unnecessary to be injective. Instead, they could also be lossy, but in a regular manner. We also put forward richer abstractions of RLFs, namely all-but-one regular lossy functions (ABO-RLFs) and one-time regular lossy filters (OT-RLFs). We show that (ABO)-RLFs admit efficient constructions from both a variety of numbertheoretic assumptions and hash proof system (HPS) for subset membership problems satisfying natural algebraic properties. Thanks to the relaxations on functionality, the constructions enjoy much compact key size and better computational efficiency than that of (ABO)-LTFs. We demonstrate the utility of RLFs and their extensions in the leakage-resilient cryptography. • As a special case of RLFs, lossy functions imply leakage-resilient injective one-way functions with optimal leakage rate 1 −o(1). • ABO-RLFs (or OT-RLFs) immediately imply leakage-resilient one-time message authentication code (MAC) with optimal leakage rate 1 −o(1). • ABO-RLFs together with HPS give rise to leakage-resilient chosen-ciphertext (CCA) secure key encapsulation mechanisms (KEM) (this approach extends naturally to the identity-based setting). Combining the construction of ABO-RLFs from HPS, this gives the first leakage-resilient CCA-secure public-key encryption (PKE) with optimal leakage rate based solely on HPS, and thus goes beyond the barrier posed by Dodis et al. (Asiacrypt 2010). Our construction also applies to the identity-based setting, yielding LR-CCA secure IB-KEM with higher leakage rate than previous works.
format text
author CHEN, Yu
QIN, Baodong
XUE, Haiyang
author_facet CHEN, Yu
QIN, Baodong
XUE, Haiyang
author_sort CHEN, Yu
title Regular lossy functions and their applications in leakage-resilient cryptography
title_short Regular lossy functions and their applications in leakage-resilient cryptography
title_full Regular lossy functions and their applications in leakage-resilient cryptography
title_fullStr Regular lossy functions and their applications in leakage-resilient cryptography
title_full_unstemmed Regular lossy functions and their applications in leakage-resilient cryptography
title_sort regular lossy functions and their applications in leakage-resilient cryptography
publisher Institutional Knowledge at Singapore Management University
publishDate 2018
url https://ink.library.smu.edu.sg/sis_research/9200
https://ink.library.smu.edu.sg/context/sis_research/article/10205/viewcontent/1_s2.0_S0304397518302937_main.pdf
_version_ 1814047789215121408