Show simple item record

dc.contributor.authorBrakerski, Zvika
dc.contributor.authorGoldwasser, Shafi
dc.date.accessioned2012-10-15T14:33:12Z
dc.date.available2012-10-15T14:33:12Z
dc.date.issued2010-08
dc.date.submitted2010-08
dc.identifier.isbn978-3-642-14622-0
dc.identifier.issn0302-9743
dc.identifier.issn1611-3349
dc.identifier.urihttp://hdl.handle.net/1721.1/73957
dc.description30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedingsen_US
dc.description.abstractThe main results of this work are new public-key encryption schemes that, under the quadratic residuosity (QR) assumption (or Paillier’s decisional composite residuosity (DCR) assumption), achieve key-dependent message security as well as high resilience to secret key leakage and high resilience to the presence of auxiliary input information. In particular, under what we call the subgroup indistinguishability assumption, of which the QR and DCR are special cases, we can construct a scheme that has: • Key-dependent message (circular) security. Achieves security even when encrypting affine functions of its own secret key (in fact, w.r.t. affine “key-cycles” of predefined length). Our scheme also meets the requirements for extending key-dependent message security to broader classes of functions beyond affine functions using previous techniques of Brakerski et al. or Barak et al. • Leakage resiliency. Remains secure even if any adversarial low-entropy (efficiently computable) function of the secret key is given to the adversary. A proper selection of parameters allows for a “leakage rate” of (1 − o(1)) of the length of the secret key. • Auxiliary-input security. Remains secure even if any sufficiently hard to invert (efficiently computable) function of the secret key is given to the adversary. Our scheme is the first to achieve key-dependent security and auxiliary-input security based on the DCR and QR assumptions. Previous schemes that achieved these properties relied either on the DDH or LWE assumptions. The proposed scheme is also the first to achieve leakage resiliency for leakage rate (1 − o(1)) of the secret key length, under the QR assumption. We note that leakage resilient schemes under the DCR and the QR assumptions, for the restricted case of composite modulus product of safe primes, were implied by the work of Naor and Segev, using hash proof systems. However, under the QR assumption, known constructions of hash proof systems only yield a leakage rate of o(1) of the secret key length.en_US
dc.description.sponsorshipMicrosoft Researchen_US
dc.language.isoen_US
dc.publisherSpringer Berlin / Heidelbergen_US
dc.relation.isversionofhttp://dx.doi.org/10.1007/978-3-642-14623-7_1en_US
dc.rightsCreative Commons Attribution-Noncommercial-Share Alike 3.0en_US
dc.rights.urihttp://creativecommons.org/licenses/by-nc-sa/3.0/en_US
dc.sourceOther University Web Domainen_US
dc.titleCircular and leakage resilient public-key encryption under subgroup indistinguishability (or: Quadratic residuosity strikes back)en_US
dc.typeArticleen_US
dc.identifier.citationBrakerski, Zvika, and Shafi Goldwasser. “Circular and Leakage Resilient Public-Key Encryption Under Subgroup Indistinguishability.” Advances in Cryptology – CRYPTO 2010. Ed. Tal Rabin. LNCS Vol. 6223. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. 1–20.en_US
dc.contributor.departmentMassachusetts Institute of Technology. Department of Electrical Engineering and Computer Scienceen_US
dc.contributor.mitauthorGoldwasser, Shafi
dc.relation.journalAdvances in Cryptology – CRYPTO 2010en_US
dc.eprint.versionAuthor's final manuscripten_US
dc.type.urihttp://purl.org/eprint/type/ConferencePaperen_US
dspace.orderedauthorsBrakerski, Zvika; Goldwasser, Shafien
dc.identifier.orcidhttps://orcid.org/0000-0003-4728-1535
mit.licenseOPEN_ACCESS_POLICYen_US
mit.metadata.statusComplete


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record