Impossibility Of Black-Box Simulation Against Leakage Attacks

Advances in Cryptology -- CRYPTO 2015(2015)

引用 8|浏览118
暂无评分
摘要
In this work, we show how to use the positive results on succinct argument systems to prove impossibility results on leakage-resilient black-box zero knowledge. This recently proposed notion of zero knowledge deals with an adversary that can make leakage queries on the state of the prover. Our result holds for black-box simulation only and we also give some insights on the non-black-box case. Additionally, we show that, for several functionalities, leakage-resilient multi-party computation is impossible (regardless of the number of players and even if just one player is corrupted).More in details, we achieve the above results by extending a technique of [Nielsen, Venturi, Zottarel - PKC13] to prove lower bounds for leakage-resilient security. Indeed, we use leakage queries to run an execution of a communication-efficient protocol in the head of the adversary. Moreover, to defeat the black-box simulator we connect the above technique for leakage resilience to security against reset attacks.Our results show that the open problem of [Ananth, Goyal, Pandey - Crypto 14] (i.e., continual leakage-resilient proofs without a common reference string) has a negative answer when security through black-box simulation is desired. Moreover our results close the open problem of [Boyle et al. - STOC 12] for the case of black-box simulation (i.e., the possibility of continual leakage-resilient secure computation without a leak-free interactive preprocessing).
更多
查看译文
关键词
Zero knowledge,MPC,Resettability,Succinct arguments,Impossibility results,Black-box vs non-black-box simulation
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要