Robustness of the Learning with Errors Assumption
نویسندگان
چکیده
Starting with the work of Ishai-Sahai-Wagner and Micali-Reyzin, a new goal has been set within the theory of cryptography community, to design cryptographic primitives that are secure against large classes of side-channel attacks. Recently, many works have focused on designing various cryptographic primitives that are robust (retain security) even when the secret key is “leaky”, under various intractability assumptions. In this work we propose to take a step back and ask a more basic question: which of our cryptographic assumptions (rather than cryptographic schemes) are robust in presence of leakage of their underlying secrets? Our main result is that the hardness of the learning with error (LWE) problem implies its hardness with leaky secrets. More generally, we show that the standard LWE assumption implies that LWE is secure even if the secret is taken from an arbitrary distribution with sufficient entropy, and even in the presence of hard-to-invert auxiliary inputs. We exhibit various applications of this result. 1. Under the standard LWE assumption, we construct a symmetric-key encryption scheme that is robust to secret key leakage, and more generally maintains security even if the secret key is taken from an arbitrary distribution with sufficient entropy (and even in the presence of hard-to-invert auxiliary inputs). 2. Under the standard LWE assumption, we construct a (weak) obfuscator for the class of point functions with multi-bit output. We note that in most schemes that are known to be robust to leakage, the parameters of the scheme depend on the maximum leakage the system can tolerate, and hence the efficiency degrades with the maximum anticipated leakage, even if no leakage occurs at all! In contrast, the fact that we rely on a robust assumption allows us to construct a single symmetric-key encryption scheme, with parameters that are independent of the anticipated leakage, that is robust to any leakage (as long as the secret key has sufficient entropy left over). Namely, for any k < n (where n is the size of the secret key), if the secret key has only entropy k, then the security relies on the LWE assumption with secret size roughly k.
منابع مشابه
طراحی یک نمودار کنترل میانگین متحرک موزون نمایی پایدار با بازههای نمونهگیری متغیر برای کنترل تغییرات در میانگین فرآیند
The performance of an X-bar chart is usually studied under the assumption that the process standard deviation is well estimated and does not change. This is, of course, not always the case in practice and X-bar charts are not robust against errors in estimating the process standard deviation or changing standard deviation. In this paper, the use of an exponentially weighted moving average (EW...
متن کاملCommunicational Model of Organizational Learning Capabilities and Organizational Performance of Sport and Youth Offices of Iran's Northern Provinces
The purpose of this study was to determine the relationship between organizational learning capability and organizational performance in sport and youth offices of Iran's Northern provinces. Statistical population included of all managers, deputies and experts of the sport and youth offices in Iran's Northern provinces (Guilan, Mazandaran and Golestan) and managers and deputies from five select...
متن کاملDesign of Nonlinear Robust Controller and Observer for Control of a Flexible Spacecraft
Two robust nonlinear controllers along with a nonlinear observer have been developed in this study to control a 1D nonlinear flexible spacecraft. The first controller is based on dynamic inversion, while the second one is composed of dynamic inversion and µ-synthesis controllers. The extension of dynamic inversion approach to flexible spacecraft is impeded by the non-minimum phase characteristi...
متن کاملPreferred Robust Response Surface Design with Missing Observations Based on Integrated TOPSIS-AHP Method
- Missing observations occur in experimental designs as a result of insufficient sampling, machine breakdown, high cost, and errors in the measurements. In nanomanufacturing, missing observations often appear in designs because the combination of factors or molecular structures selected by a designer cannot be experimented successfully. In the current paper, Box-Behnken and face-centered compos...
متن کاملInvestigation of different types of nursing errors based on their lived and working experiences in health centers; A qualitative study
Introduction: The occurrence of human error is inevitable, and the health area and the nurses are no exception.Considering the fact that nursing service error is a harmful phenomenon and in some cases irrecoverable, therefore, identification the types of nursing errors in order to reduce them and improve patient safety is vital. Methods: This research was performed qualitatively and through a d...
متن کاملRobustness of Neural Networks against Storage Media Errors
We study the trade-offs between storage/bandwidth and prediction accuracy of neural networks that are stored in noisy media. Conventionally, it is assumed that all parameters (e.g., weight and biases) of a trained neural network are stored as binary arrays and are error-free. This assumption is based upon the implementation of error correction codes (ECCs) that correct potential bit flips in st...
متن کامل