Robustness of the Learning with Errors Assumption

نویسندگان

  • Shafi Goldwasser
  • Yael Tauman Kalai
  • Chris Peikert
  • Vinod Vaikuntanathan
چکیده

Starting with the work of Ishai-Sahai-Wagner and Micali-Reyzin, a new goal has been set within the theory of cryptography community, to design cryptographic primitives that are secure against large classes of side-channel attacks. Recently, many works have focused on designing various cryptographic primitives that are robust (retain security) even when the secret key is “leaky”, under various intractability assumptions. In this work we propose to take a step back and ask a more basic question: which of our cryptographic assumptions (rather than cryptographic schemes) are robust in presence of leakage of their underlying secrets? Our main result is that the hardness of the learning with error (LWE) problem implies its hardness with leaky secrets. More generally, we show that the standard LWE assumption implies that LWE is secure even if the secret is taken from an arbitrary distribution with sufficient entropy, and even in the presence of hard-to-invert auxiliary inputs. We exhibit various applications of this result. 1. Under the standard LWE assumption, we construct a symmetric-key encryption scheme that is robust to secret key leakage, and more generally maintains security even if the secret key is taken from an arbitrary distribution with sufficient entropy (and even in the presence of hard-to-invert auxiliary inputs). 2. Under the standard LWE assumption, we construct a (weak) obfuscator for the class of point functions with multi-bit output. We note that in most schemes that are known to be robust to leakage, the parameters of the scheme depend on the maximum leakage the system can tolerate, and hence the efficiency degrades with the maximum anticipated leakage, even if no leakage occurs at all! In contrast, the fact that we rely on a robust assumption allows us to construct a single symmetric-key encryption scheme, with parameters that are independent of the anticipated leakage, that is robust to any leakage (as long as the secret key has sufficient entropy left over). Namely, for any k < n (where n is the size of the secret key), if the secret key has only entropy k, then the security relies on the LWE assumption with secret size roughly k.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

طراحی یک نمودار کنترل میانگین متحرک موزون نمایی پایدار با بازه‌های نمونه‌گیری متغیر برای کنترل تغییرات در میانگین فرآیند

  The performance of an X-bar chart is usually studied under the assumption that the process standard deviation is well estimated and does not change. This is, of course, not always the case in practice and X-bar charts are not robust against errors in estimating the process standard deviation or changing standard deviation. In this paper, the use of an exponentially weighted moving average (EW...

متن کامل

Communicational Model of Organizational Learning Capabilities and Organizational Performance of Sport and Youth Offices of Iran's Northern Provinces

The purpose of this study was to determine the relationship between organizational learning capability and organizational performance in sport and youth offices of Iran's Northern provinces. Statistical population included of all managers, deputies and experts of the sport and youth offices in Iran's Northern provinces (Guilan, Mazandaran and Golestan) and managers and deputies from five select...

متن کامل

Design of Nonlinear Robust Controller and Observer for Control of a Flexible Spacecraft

Two robust nonlinear controllers along with a nonlinear observer have been developed in this study to control a 1D nonlinear flexible spacecraft. The first controller is based on dynamic inversion, while the second one is composed of dynamic inversion and µ-synthesis controllers. The extension of dynamic inversion approach to flexible spacecraft is impeded by the non-minimum phase characteristi...

متن کامل

Preferred Robust Response Surface Design with Missing Observations Based on Integrated TOPSIS-AHP Method

- Missing observations occur in experimental designs as a result of insufficient sampling, machine breakdown, high cost, and errors in the measurements. In nanomanufacturing, missing observations often appear in designs because the combination of factors or molecular structures selected by a designer cannot be experimented successfully. In the current paper, Box-Behnken and face-centered compos...

متن کامل

Investigation of different types of nursing errors based on their lived and working experiences in health centers; A qualitative study

Introduction: The occurrence of human error is inevitable, and the health area and the nurses are no exception.Considering the fact that nursing service error is a harmful phenomenon and in some cases irrecoverable, therefore, identification the types of nursing errors in order to reduce them and improve patient safety is vital. Methods: This research was performed qualitatively and through a d...

متن کامل

Robustness of Neural Networks against Storage Media Errors

We study the trade-offs between storage/bandwidth and prediction accuracy of neural networks that are stored in noisy media. Conventionally, it is assumed that all parameters (e.g., weight and biases) of a trained neural network are stored as binary arrays and are error-free. This assumption is based upon the implementation of error correction codes (ECCs) that correct potential bit flips in st...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010