Parallel repetition for leakage resilience amplification revisited

  • Authors:
  • Abhishek Jain;Krzysztof Pietrzak

  • Affiliations:
  • UCLA;CWI, Amsterdam

  • Venue:
  • TCC'11 Proceedings of the 8th conference on Theory of cryptography
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

If a cryptographic primitive remains secure even if l bits about the secret key are leaked to the adversary, one would expect that at least one of n independent instantiations of the scheme remains secure given n ċ l bits of leakage. This intuition has been proven true for schemes satisfying some special information-theoretic properties by Alwen et al. [Eurocrypt' 10]. On the negative side, Lewko and Waters [FOCS'10] construct a CPA secure public-key encryption scheme for which this intuition fails. The counterexample of Lewko and Waters leaves open the interesting possibility that for any scheme there exists a constant c n fold repetition remains secure against cċnċl bits of leakage. Furthermore, their counterexample requires the n copies of the encryption scheme to share a common reference parameter, leaving open the possibility that the intuition is true for all schemes without common setup. In this work we give a stronger counterexample ruling out these possibilities. We construct a signature scheme such that: 1. a single instantiation remains secure given l = log(k) bits of leakage where k is a security parameter 2. any polynomial number of independent instantiations can be broken (in the strongest sense of key-recovery) given l′ = poly(k) bits of leakage. Note that l′ does not depend on the number of instances. The computational assumption underlying our counterexample is that non-interactive computationally sound proofs exist. Moreover, under a stronger (non-standard) assumption about such proofs, our counterexample does not require a common reference parameter. The underlying idea of our counterexample is rather generic and can be applied to other primitives like encryption schemes.