Updatable Lossy Trapdoor Functions and Its Application in Continuous Leakage

Lossy trapdoor functions LTFs were firstly introduced by Peikert and Waters [2]. Since their introduction, LTFs have found numerous applications. In this paper we focus on the LTFs in the continuous leakage. We introduce the new notion of updatable LTFs ULTFs and give its formal definition and security properties. Based on these, we extend the security model of the LTFs to continuous leakage. Under the DDH assumption and DCR assumption respectively, we show two explicit LTFs against continuous leakage in the standard model. We also show the performance of the proposed schemes compared with the known existing continuous leakage resilient LTFs.

[1]  Ariel J. Feldman,et al.  Lest we remember: cold-boot attacks on encryption keys , 2008, CACM.

[2]  Futai Zhang,et al.  Leakage-resilient identity-based encryption scheme , 2013, Int. J. Grid Util. Comput..

[3]  Feng Xia,et al.  Special issue on energy-aware computing and communications , 2013, Cluster Computing.

[4]  Limin Shen,et al.  A New Variant of the Cramer-Shoup Leakage-Resilient Public Key Encryption , 2012, 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems.

[5]  Serge Fehr,et al.  On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles , 2008, CRYPTO.

[6]  Vinod Vaikuntanathan,et al.  On Continual Leakage of Discrete Log Representations , 2013, IACR Cryptol. ePrint Arch..

[7]  Yael Tauman Kalai,et al.  Overcoming the Hole in the Bucket: Public-Key Cryptography Resilient to Continual Memory Leakage , 2010, 2010 IEEE 51st Annual Symposium on Foundations of Computer Science.

[8]  Brent Waters,et al.  Deterministic Public-Key Encryption Under Continual Leakage , 2016, ACNS.

[9]  Brent Waters,et al.  Lossy trapdoor functions and their applications , 2008, SIAM J. Comput..

[10]  Kefei Chen,et al.  Leakage-resilient lossy trapdoor functions and public-key encryption , 2013, AsiaPKC '13.

[11]  Vinod Vaikuntanathan,et al.  Simultaneous Hardcore Bits and Cryptography against Memory Attacks , 2009, TCC.

[12]  Hoeteck Wee,et al.  KDM-Security via Homomorphic Smooth Projective Hashing , 2016, Public Key Cryptography.

[13]  Limin Shen,et al.  Efficient leakage-resilient public key encryption from DDH assumption , 2013, Cluster Computing.

[14]  Yevgeniy Dodis,et al.  Cryptography against Continuous Memory Attacks , 2010, 2010 IEEE 51st Annual Symposium on Foundations of Computer Science.

[15]  Moni Naor,et al.  Public-Key Encryption in the Bounded-Retrieval Model , 2010, EUROCRYPT.

[16]  Rafail Ostrovsky,et al.  Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..

[17]  Yevgeniy Dodis,et al.  Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model , 2009, CRYPTO.

[18]  Zvika Brakerski,et al.  Circular and Leakage Resilient Public-Key Encryption Under Subgroup Indistinguishability (or: Quadratic Residuosity Strikes Back) , 2010, IACR Cryptol. ePrint Arch..

[19]  Moni Naor,et al.  Public-Key Cryptosystems Resilient to Key Leakage , 2009, SIAM J. Comput..

[20]  Rafail Ostrovsky,et al.  Circular-Secure Encryption from Decision Diffie-Hellman , 2008, CRYPTO.