Skip to main content
Top

2021 | OriginalPaper | Chapter

Rate-1 Key-Dependent Message Security via Reusable Homomorphic Extractor Against Correlated-Source Attacks

Authors : Qiqi Lai, Feng-Hao Liu, Zhedong Wang

Published in: Public-Key Cryptography – PKC 2021

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In this work, we first present general methods to construct information rate-1 PKE that is \(\mathsf {KDM}^{(n)}\)-secure with respect to block-affine functions for any unbounded polynomial n. To achieve this, we propose a new notion of extractor that satisfies reusability, homomorphic, and security against correlated-source attacks, and show how to use this extractor to improve the information rate of the \(\mathsf {KDM}\)-secure PKE of Brakerski et al. (Eurocrypt 18). Then, we show how to amplify \(\mathsf {KDM}\) security from block-affine function class into general bounded size circuits via a variant of the technique of Applebaum (Eurocrypt 11), achieving better efficiency. Furthermore, we show how to generalize these approaches to the IBE setting.
Additionally, our PKE and IBE schemes are also leakage resilient, with leakage rates \(1-o(1)\) against a slightly smaller yet still general class – block leakage functions. We can instantiate the required building blocks from \(\mathsf {LWE}\) or \(\mathsf {DDH}\).

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
1
Information rate is defined as the message-to-ciphertext ratio when one encrypts sufficiently long plaintexts.
 
2
When the secret key is stored in blocks, a block leakage function can leak individual blocks one after another, as long as the blocks still remain a block source.
 
3
The extractor can extract uniform string (up to statistical distance \(\varepsilon \)) for any source with min-entropy k.
 
4
Clearly, this notion cannot be achieved unconditionally, as an information-theoretic extractor requires (conditional) min-entropy from the source, which would be exhausted after a bounded number of extractions.
 
5
Clearly, this notion is stronger than the reusable extractor, which can be viewed as a special case where \(\mathfrak {g}_i\)’s are all the identity function. Thus, this notion is only possible under computational assumptions.
 
6
Here, t denotes the number of times the weak source being reused.
 
7
Just as described in full version, block leakage means that each block of source is leaked by an independent function and remain enough entropy conditioned on leakage against other blocks.
 
8
In [4], Applebaum leverages the abstract notion of randomized encoding to achieve \(\mathsf {KDM}\) amplification. Here, we directly amplify our scheme through using Garbled Circuits, which is a well-known instantiation of randomized encoding.
 
Literature
2.
go back to reference Alwen, J., Dodis, Y., Naor, M., Segev, S. Walfish, G., Wichs, D.: Public-key encryption in the bounded-retrieval model. In: Gilbert [17], pp. 113–134 Alwen, J., Dodis, Y., Naor, M., Segev, S. Walfish, G., Wichs, D.: Public-key encryption in the bounded-retrieval model. In: Gilbert [17], pp. 113–134
5.
go back to reference Applebaum, B., Cash, D., Peikert, C., Sahai, A.: Fast cryptographic primitives and circular-secure encryption based on hard learning problems. In: Halevi [20], pp. 595–618 Applebaum, B., Cash, D., Peikert, C., Sahai, A.: Fast cryptographic primitives and circular-secure encryption based on hard learning problems. In: Halevi [20], pp. 595–618
7.
go back to reference Barak, B., Haitner, I., Hofheinz, D., Ishai, Y. Bounded key-dependent message security. In: Gilbert [17], pp. 423–444 Barak, B., Haitner, I., Hofheinz, D., Ishai, Y. Bounded key-dependent message security. In: Gilbert [17], pp. 423–444
14.
go back to reference Dodis, Y., Kalai, Y.T., Lovett, S.: On cryptography with auxiliary input. In: Mitzenmacher, M. (ed.) 41st ACM STOC, pp. 621–630. ACM Press, May/June (2009) Dodis, Y., Kalai, Y.T., Lovett, S.: On cryptography with auxiliary input. In: Mitzenmacher, M. (ed.) 41st ACM STOC, pp. 621–630. ACM Press, May/June (2009)
15.
go back to reference Dodis, Y., Ostrovsky, R., Reyzin, L., Smith, A.D.: Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. SIAM J. Comput. 38(1), 97–139 (2008)MathSciNetCrossRef Dodis, Y., Ostrovsky, R., Reyzin, L., Smith, A.D.: Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. SIAM J. Comput. 38(1), 97–139 (2008)MathSciNetCrossRef
17.
go back to reference Gilbert, H. (ed.): EUROCRYPT 2010, volume 6110 of LNCS. Springer, Heidelberg, May/June 2010 Gilbert, H. (ed.): EUROCRYPT 2010, volume 6110 of LNCS. Springer, Heidelberg, May/June 2010
25.
go back to reference Naor, M., Segev, G.: Public-key cryptosystems resilient to key leakage. In: Halevi [20], pp. 18–35 Naor, M., Segev, G.: Public-key cryptosystems resilient to key leakage. In: Halevi [20], pp. 18–35
26.
go back to reference Vadhan, S.P.: Pseudorandomness. Found. Trends® Theor. Comput. Sci. 7(1–3), 1–336 (2012) Vadhan, S.P.: Pseudorandomness. Found. Trends®  Theor. Comput. Sci. 7(1–3), 1–336 (2012)
Metadata
Title
Rate-1 Key-Dependent Message Security via Reusable Homomorphic Extractor Against Correlated-Source Attacks
Authors
Qiqi Lai
Feng-Hao Liu
Zhedong Wang
Copyright Year
2021
DOI
https://doi.org/10.1007/978-3-030-75245-3_16

Premium Partner