Secrecy Without Perfect Randomness: Cryptography with (Bounded) Weak Sources
نویسندگان
چکیده
Cryptographic protocols are commonly designed and their security proven under the assumption that the protocol parties have access to perfect (uniform) randomness. Physical randomness sources deployed in practical implementations of these protocols often fall short in meeting this assumption, but instead provide only a steady stream of bits with certain high entropy. Trying to ground cryptographic protocols on such imperfect, weaker sources of randomness has thus far mostly given rise to a multitude of impossibility results, including the impossibility to construct provably secure encryption, commitments, secret sharing, and zero-knowledge proofs based solely on a weak source. More generally, indistinguishability-based properties break down for such weak sources. In this paper, we show that the loss of security induced by using a weak source can be meaningfully quantified if the source is bounded, e.g., for the well-studied Santha-Vazirani (SV) sources. The quantification relies on a novel relaxation of indistinguishability by a quantitative parameter. We call the resulting notion differential indistinguishability in order to reflect its structural similarity to differential privacy. More concretely, we prove that indistinguishability with uniform randomness implies differential indistinguishability with weak randomness. We show that if the amount of weak randomness is limited (e.g., by using it only to seed a PRG), all cryptographic primitives and protocols still achieve differential indistinguishability.
منابع مشابه
Towards Foundations of Cryptography: Investigation of Perfect Secrecy 1
In the spirit of Shannon's theory of secrecy systems we analyse several possible natural deenitons of the notion of perfect secrecy; these deenitions are based on arguments taken from probability theory, information theory, the theory of computational complexity, and the theory of program-size complexity or algorithmic information. It turns out that none of these deenitions models the intuitive...
متن کاملRandomness Extraction Beyond the Classical World
Randomness is an extremely useful resource in diverse fields in computer science, such as randomized algorithms, distributed algorithms, and cryptography. In these fields, we often assume that perfect randomness are available. However, the assumption may not be realistic, since random sources available in our physical world tend to be correlated and biased. Furthermore, there is no way to ensur...
متن کاملThe Vernam cipher is robust to small deviations from randomness
The Vernam cipher (or one-time pad) has played an important rule in cryptography because it is a perfect secrecy system. For example, if an English text (presented in binary system) X1X2... is enciphered according to the formula Zi = (Xi + Yi) mod 2, where Y1Y2... is a key sequence generated by the Bernoulli source with equal probabilities of 0 and 1, anyone who knows Z1Z2... has no information...
متن کاملRandomness-Dependent Message Security
Traditional definitions of the security of encryption schemes assume that the messages encrypted are chosen independently of the randomness used by the encryption scheme. Recent works, implicitly by Myers and Shelat (FOCS’09) and Bellare et al (AsiaCrypt’09), and explicitly by Hemmenway and Ostrovsky (ECCC’10), consider randomness-dependent message (RDM) security of encryption schemes, where th...
متن کاملOvercoming Weak Expectations via the Rényi Entropy and the Expanded Computational Entropy
In the ideal world, cryptographic models take for granted that the secret sources (e.g. secret keys and other secret randomness) are derived from uniform distribution. However, in reality, we may only obtain some ‘weak’ random sources guaranteed with high unpredictability (e.g. biometric data, physical sources, and secrets with partial leakage). Formally, the security of cryptographic models is...
متن کامل