Javascript must be enabled to continue!
Continuous Leakage Resilient Lossy Trapdoor Functions
View through CrossRef
Lossy trapdoor functions (LTFs) were first introduced by Peikert and Waters (STOC’08). Since their introduction, lossy trapdoor functions have found numerous applications. They can be used as tools to construct important cryptographic primitives such as injective one-way trapdoor functions, chosen-ciphertext-secure public key encryptions, deterministic encryptions, et al. In this paper, we focus on the lossy trapdoor functions in the presence of continuous leakage. We introduce the new notion of updatable lossy trapdoor functions (ULTFs) and give their formal definition and security properties. Based on these, we extend the security model to the LTFs against continuous leakage when the evaluation algorithm is leakage resilient. Under the standard DDH assumption and DCR assumption, respectively, we show two explicit lossy trapdoor functions against continuous leakage in the standard model. In these schemes, using the technology of matrix kernel, the trapdoor can be refreshed at regular intervals and the adversaries can learn unbounded leakage information on the trapdoor along the whole system life. At the same time, we also show the performance of the proposed schemes compared with the known existing continuous leakage resilient lossy trapdoor functions.
Title: Continuous Leakage Resilient Lossy Trapdoor Functions
Description:
Lossy trapdoor functions (LTFs) were first introduced by Peikert and Waters (STOC’08).
Since their introduction, lossy trapdoor functions have found numerous applications.
They can be used as tools to construct important cryptographic primitives such as injective one-way trapdoor functions, chosen-ciphertext-secure public key encryptions, deterministic encryptions, et al.
In this paper, we focus on the lossy trapdoor functions in the presence of continuous leakage.
We introduce the new notion of updatable lossy trapdoor functions (ULTFs) and give their formal definition and security properties.
Based on these, we extend the security model to the LTFs against continuous leakage when the evaluation algorithm is leakage resilient.
Under the standard DDH assumption and DCR assumption, respectively, we show two explicit lossy trapdoor functions against continuous leakage in the standard model.
In these schemes, using the technology of matrix kernel, the trapdoor can be refreshed at regular intervals and the adversaries can learn unbounded leakage information on the trapdoor along the whole system life.
At the same time, we also show the performance of the proposed schemes compared with the known existing continuous leakage resilient lossy trapdoor functions.
Related Results
Multiple Water and Sand Leakage Model Tests for Shield Tunnels
Multiple Water and Sand Leakage Model Tests for Shield Tunnels
Water and sand leakage in shield tunnels has become more of a research interest in recent years. On the other hand, accidents involving underground engineering can take many forms ...
EVALUASI PENERAPAN KATEGORI DAN TUJUAN KOTA TANGGUH PADA DOKUMEN KEBIJAKAN STRATEGI KETAHANAN KOTA 100 RESILIENT CITY
EVALUASI PENERAPAN KATEGORI DAN TUJUAN KOTA TANGGUH PADA DOKUMEN KEBIJAKAN STRATEGI KETAHANAN KOTA 100 RESILIENT CITY
Abstract100 Resilient City is an activity program pioneered by the Rockefeller Foundation which is intended to help cities become strong cities in the face of physical, social, an...
Practical notes on lossy compression of scientific data
Practical notes on lossy compression of scientific data
<p>Lossy compression methods are extremely efficient in terms of space and performance and allow for reduction of network bandwidth and disk space needed to store dat...
Continuous Leakage-Amplified Public-Key Encryption With CCA Security
Continuous Leakage-Amplified Public-Key Encryption With CCA Security
Abstract
Secret key leakage has become a security threat in computer systems, and it is crucial that cryptographic schemes should resist various leakage attacks, inc...
Early circulating biomarker signatures of dengue-associated plasma leakage uncovered by proteomics
Early circulating biomarker signatures of dengue-associated plasma leakage uncovered by proteomics
Abstract
Background
Plasma leakage, a defining feature of severe dengue, lacks early predictive biomarkers critical for timely clinical d...
Radiological appearances of Anastomotic Leakage after Radical Gastrectomy
Radiological appearances of Anastomotic Leakage after Radical Gastrectomy
Abstract
Background
Anastomotic leakage is a critical postoperative complication after gastric cancer surgery. Previous studies...
Risk assessment of CO2 leakage through the caprock
Risk assessment of CO2 leakage through the caprock
The primary focus of this study was to evaluate the impact of CO2 leakage from the storage zone through potential leakage pathways and leakage impact factors (risks). During site ...
A Lossy Coated Thin Wire Model Based on the Unconditionally Stable Associated Hermite FDTD Method
A Lossy Coated Thin Wire Model Based on the Unconditionally Stable Associated Hermite FDTD Method
This paper presents a lossy coated thin wire model based on the unconditionally stable (US) associated Hermite finite-difference time-domain (AH FDTD) method. The normal electric f...

