Information Theoretic Security
Volume 9063 of the series Lecture Notes in Computer Science pp 69-86
Unifying Leakage Classes: Simulatable Leakage and Pseudoentropy
- Benjamin FullerAffiliated withBoston UniversityMIT Lincoln Laboratory
- , Ariel HamlinAffiliated withMIT Lincoln Laboratory
Abstract
Leakage resilient cryptography designs systems to withstand partial adversary knowledge of secret state. Ideally, leakage-resilient systems withstand current and future attacks; restoring confidence in the security of implemented cryptographic systems. Understanding the relation between classes of leakage functions is an important aspect.
In this work, we consider the memory leakage model, where the leakage class contains functions over the system’s entire secret state. Standard limitations include functions with bounded output length, functions that retain (pseudo) entropy in the secret, and functions that leave the secret computationally unpredictable.
Standaert, Pereira, and Yu (Crypto, 2013) introduced a new class of leakage functions they call simulatable leakage. A leakage function is simulatable if a simulator can produce indistinguishable leakage without access to the true secret state. We extend their notion to general applications and consider two versions. For weak simulatability: the simulated leakage must be indistinguishable from the true leakage in the presence of public information. For strong simulatability, this requirement must also hold when the distinguisher has access to the true secret state. We show the following:
-
Weakly simulatable functions retain computational unpredictability.
-
Strongly simulatability functions retain pseudoentropy.
-
There are bounded length functions that are not weakly simulatable.
-
There are weakly simulatable functions that remove pseudoentropy.
-
There are leakage functions that retain computational unpredictability are not weakly simulatable.
- Title
- Unifying Leakage Classes: Simulatable Leakage and Pseudoentropy
- Book Title
- Information Theoretic Security
- Book Subtitle
- 8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings
- Pages
- pp 69-86
- Copyright
- 2015
- DOI
- 10.1007/978-3-319-17470-9_5
- Print ISBN
- 978-3-319-17469-3
- Online ISBN
- 978-3-319-17470-9
- Series Title
- Lecture Notes in Computer Science
- Series Volume
- 9063
- Series ISSN
- 0302-9743
- Publisher
- Springer International Publishing
- Copyright Holder
- Springer International Publishing Switzerland
- Additional Links
- Topics
- Industry Sectors
- eBook Packages
- Editors
-
-
Anja Lehmann
(13)
-
Stefan Wolf
(14)
-
Anja Lehmann
- Editor Affiliations
-
- 13. IBM Research Zurich
- 14. Università della Svizzera italiana (USI)
- Authors
-
- Benjamin Fuller (15) (16)
- Ariel Hamlin (16)
- Author Affiliations
-
- 15. Boston University, 244 Wood Street, Lexington, MA, 02420, USA
- 16. MIT Lincoln Laboratory, One Silber Way, Boston, MA, 02215, USA
Continue reading...
To view the rest of this content please follow the download PDF link above.