37 research outputs found
Pseudorandomness Against Mean and Variance Bounded Attackers
The recent progress in key derivation (Barak at al. CRYPTO\u2711, Dodis Yu TCC\u272013) introduced the concept of constrained profiles for attackers advantage,
recognizing that security bounds can be significantly improved (alternatively: lots of randomness can be saved) when the advantage, as the function of the key, is bounded in mean or variance. This paper studies \emph{minimal requirements for keys} to achieve security under such restricted attackers.
We frame the problem as characterizing \emph{pseudorandomness against constrained distinguishers} and show that minimal assumptions are respectively (a) high smooth min-entropy and (b) high smooth collision entropy. This matches the (folklore extension of) assumptions of previous works.
Besides providing lower bounds, we offer more insights into this key derivation problem and elegant proof techniques of geometric flavor
ClaimChain: Improving the Security and Privacy of In-band Key Distribution for Messaging
The social demand for email end-to-end encryption is barely supported by
mainstream service providers. Autocrypt is a new community-driven open
specification for e-mail encryption that attempts to respond to this demand. In
Autocrypt the encryption keys are attached directly to messages, and thus the
encryption can be implemented by email clients without any collaboration of the
providers. The decentralized nature of this in-band key distribution, however,
makes it prone to man-in-the-middle attacks and can leak the social graph of
users. To address this problem we introduce ClaimChain, a cryptographic
construction for privacy-preserving authentication of public keys. Users store
claims about their identities and keys, as well as their beliefs about others,
in ClaimChains. These chains form authenticated decentralized repositories that
enable users to prove the authenticity of both their keys and the keys of their
contacts. ClaimChains are encrypted, and therefore protect the stored
information, such as keys and contact identities, from prying eyes. At the same
time, ClaimChain implements mechanisms to provide strong non-equivocation
properties, discouraging malicious actors from distributing conflicting or
inauthentic claims. We implemented ClaimChain and we show that it offers
reasonable performance, low overhead, and authenticity guarantees.Comment: Appears in 2018 Workshop on Privacy in the Electronic Society
(WPES'18
On the Impossibility of Cryptography with Tamperable Randomness
We initiate a study of the security of cryptographic primitives in the presence of efficient tampering attacks to the randomness of honest parties.
More precisely, we consider p-tampering attackers that may \emph{efficiently} tamper with each bit of the honest parties\u27 random tape with probability p, but have to do so in an ``online\u27\u27 fashion.
Our main result is a strong negative result: We show that any secure
encryption scheme, bit commitment scheme, or zero-knowledge protocol
can be ``broken\u27\u27 with probability by a -tampering attacker. The core of this result is a new Fourier analytic technique for biasing the output of bounded-value functions, which may be of independent interest.
We also show that this result cannot be extended to primitives such as
signature schemes and identification protocols: assuming the existence
of one-way functions, such primitives can be made resilient to (\nicefrac{1}{\poly(n)})-tampering attacks where is the security~parameter
The Cryptographic Hardness of Random Local Functions -- Survey
Constant parallel-time cryptography allows to perform complex cryptographic tasks at an ultimate level of parallelism, namely, by local functions
that each of their output bits depend on a constant number of input bits. A natural way to obtain local cryptographic constructions is to use \emph{random local functions} in which each output bit is computed by applying some fixed -ary predicate to a randomly chosen -size subset of the input bits.
In this work, we will study the cryptographic hardness of random local functions. In particular, we will survey known attacks and hardness results, discuss different flavors of hardness (one-wayness, pseudorandomness, collision resistance, public-key encryption), and mention applications to other problems in cryptography and computational complexity. We also present some open questions with the hope to develop a systematic study of the cryptographic hardness of local functions