International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

Leakage-Resilient Cryptography from Puncturable Primitives and Obfuscation

Authors:
Yu Chen
Yuyu Wang
Hong-Sheng Zhou
Download:
DOI: 10.1007/978-3-030-03329-3_20
Search ePrint
Search Google
Presentation: Slides
Conference: ASIACRYPT 2018
Abstract: In this work, we develop a framework for building leakage-resilient cryptosystems in the bounded leakage model from puncturable primitives and indistinguishability obfuscation ( $$i\mathcal {O}$$ ). The major insight of our work is that various types of puncturable pseudorandom functions (PRFs) can achieve leakage resilience on an obfuscated street.First, we build leakage-resilient weak PRFs from weak puncturable PRFs and $$i\mathcal {O}$$ , which readily imply leakage-resilient secret-key encryption. Then, we build leakage-resilient publicly evaluable PRFs (PEPRFs) from puncturable PEPRFs and $$i\mathcal {O}$$ , which readily imply leakage-resilient key encapsulation mechanism and thus public-key encryption. As a building block of independent interest, we realize puncturable PEPRFs from either newly introduced puncturable objects such as puncturable trapdoor functions and puncturable extractable hash proof systems or existing puncturable PRFs with $$i\mathcal {O}$$ . Finally, we construct the first leakage-resilient public-coin signature from selective puncturable PRFs, leakage-resilient one-way functions and $$i\mathcal {O}$$ . This settles the open problem posed by Boyle, Segev, and Wichs (Eurocrypt 2011).By further assuming the existence of lossy functions, all the above constructions achieve optimal leakage rate of $$1 - o(1)$$ . Such a leakage rate is not known to be achievable for weak PRFs, PEPRFs and public-coin signatures before. This also resolves the open problem posed by Dachman-Soled, Gordon, Liu, O’Neill, and Zhou (PKC 2016, JOC 2018).
BibTeX
@inproceedings{asiacrypt-2018-29176,
  title={Leakage-Resilient Cryptography from Puncturable Primitives and Obfuscation},
  booktitle={Advances in Cryptology – ASIACRYPT 2018},
  series={Lecture Notes in Computer Science},
  publisher={Springer},
  volume={11273},
  pages={575-606},
  doi={10.1007/978-3-030-03329-3_20},
  author={Yu Chen and Yuyu Wang and Hong-Sheng Zhou},
  year=2018
}