History independent data structures, presented by Micciancio, are data structures that possess a strong security property: even if an intruder manages to get a copy of the data structure, the memory layout of the structure yields no additional information on the history of operations applied on the structure beyond the information obtainable from the content itself. Naor and Teague proposed a stronger notion of history independence in which the intruder may break into the system several times without being noticed and still obtain no additional information from reading the memory layout of the data structure. An open question posed by Naor and Teague is whether these two notions are equally hard to obtain. In this paper we provide a separation between the two requirements for comparison-based algorithms. We show very strong lower bounds for obtaining the stronger notion of history independence for a large class of data structures, including, for example, the heap and the queue abstract data structures. We also provide complementary upper bounds showing that the heap abstract data structure may be made weakly history independent in the comparison based model without incurring any additional (asymptotic) cost on any of its operations. (A similar result is easy for the queue.) Thus, we obtain the first separation between the two notions of history independence. The gap we obtain is exponential: some operations may be executed in logarithmic time (or even in constant time) with the weaker definition, but require linear time with the stronger definition.
[1]
Rafail Ostrovsky,et al.
Software protection and simulation on oblivious RAMs
,
1996,
JACM.
[2]
Robert E. Tarjan,et al.
Making data structures persistent
,
1986,
STOC '86.
[3]
Erez Petrank,et al.
Lower and Upper Bounds on Obtaining History Independence
,
2003,
CRYPTO.
[4]
Moni Naor,et al.
Anti-persistence: history independent data structures
,
2001,
STOC '01.
[5]
Daniele Micciancio,et al.
Oblivious data structures: applications to cryptography
,
1997,
STOC '97.
[6]
R. Prim.
Shortest connection networks and some generalizations
,
1957
.
[7]
Edsger W. Dijkstra,et al.
A note on two problems in connexion with graphs
,
1959,
Numerische Mathematik.
[8]
Mihir Bellare,et al.
Incremental cryptography and application to virus protection
,
1995,
STOC '95.
[9]
A. Andersson,et al.
Faster uniquely represented dictionaries
,
1991,
[1991] Proceedings 32nd Annual Symposium of Foundations of Computer Science.
[10]
GoldreichOded,et al.
Software protection and simulation on oblivious RAMs
,
1996
.
[11]
Edwin S. Hong,et al.
Characterizing History Independent Data Structures
,
2002,
Algorithmica.