A Parallel Repetition Theorem for Leakage Resilience
نویسندگان
چکیده
A leakage resilient encryption scheme is one which stays secure even against an attacker that obtains a bounded amount of side information on the secret key (say λ bits of “leakage”). A fundamental question is whether parallel repetition amplifies leakage resilience. Namely, if we secret share our message, and encrypt the shares under two independent keys, will the resulting scheme be resilient to 2λ bits of leakage? Surprisingly, Lewko and Waters (FOCS 2010) showed that this is false. They gave an example of a public-key encryption scheme that is (CPA) resilient to λ bits of leakage, and yet its 2-repetition is not resilient to even (1 + )λ bits of leakage. In their counter-example, the repeated schemes share secretly generated public parameters. In this work, we show that under a reasonable strengthening of the definition of leakage resilience (one that captures known proof techniques for achieving non-trivial leakage resilience), parallel repetition does in fact amplify leakage (for CPA security). In particular, if fresh public parameters are used for each copy of the Lewko-Waters scheme, then their negative result does not hold, and leakage is amplified by parallel repetition. More generally, given t schemes that are resilient to λ1, . . . , λt bits of leakage, respectfully, we show that their direct product is resilient to ∑ (λi−1) bits. We present our amplification theorem in a general framework that applies other cryptographic primitives as well.
منابع مشابه
Parallel Repetition for Leakage Resilience Amplification Revisited
If a cryptographic primitive remains secure even if bits about the secret key are leaked to the adversary, one would expect that at least one of n independent instantiations of the scheme remains secure given n · bits of leakage. This intuition has been proven true for schemes satisfying some special information-theoretic properties by Alwen et al. [Eurocrypt’10]. On the negative side, Lewko an...
متن کاملOptimal Strong Parallel Repetition for Projection Games on Low Threshold Rank Graphs
Given a two-player one-round game G with value val(G) = (1 − η), how quickly does the value decay under parallel repetition? If G is a projection game, then it is known that we can guarantee val(G⊗n) ≤ (1− η), and that this is optimal. An important question is under what conditions can we guarantee that strong parallel repetition holds, i.e. val(G⊗) ≤ (1− η)? In this work, we show a strong para...
متن کاملA No - Go Theorem for Derandomized Parallel Repetition
In this work we show a barrier towards proving a randomness-efficient parallel repetition, a promising avenue for achieving many tight inapproximability results. Feige and Kilian (STOC'95) proved an impossibility result for randomnessefficient parallel repetition for two prover games with small degree, i.e., when each prover has only few possibilities for the question of the other prover. In re...
متن کاملStrong parallel repetition for free entangled games, with any number of players
We present a strong parallel repetition theorem for the entangled value of multi-player, oneround free games (games where the inputs come from a product distribution). Our result is the first parallel repetition theorem for entangled games involving more than two players. Furthermore, our theorem applies to games where the players are allowed to output (possibly entangled) quantum states as ans...
متن کاملA No-Go Theorem for Derandomized Parallel Repetition: Beyond Feige-Kilian
We prove an impossibility result for a randomness-efficient parallel repetition. Our result is motivated by an early result of Feige and Kilian (STOC’95), who proved an impossibility result for randomness-efficient parallel repetition for two prover games with small degree, i.e., when each prover has only few possibilities for the question of the other prover. In recent years, there have been i...
متن کامل