On the impossibility of cryptography with tamperable randomness
2014 (English)In: 34rd Annual International Cryptology Conference, CRYPTO 2014, 2014, no PART 1, 462-479 p.Conference paper (Refereed)
We initiate a study of the security of cryptographic primitives in the presence of efficient tampering attacks to the randomness of honest parties. More precisely, we consider p-tampering attackers that may efficiently tamper with each bit of the honest parties' random tape with probability p, but have to do so in an "online" fashion. Our main result is a strong negative result: We show that any secure encryption scheme, bit commitment scheme, or zero-knowledge protocol can be "broken" with probability p by a p-tampering attacker.The core of this result is a new Fourier analytic technique for biasing the output of bounded-value functions, which may be of independent interest. We also show that this result cannot be extended to primitives such as signature schemes and identification protocols: assuming the existence of one-way functions, such primitives can be made resilient to (1/poly(n))- tampering attacks where n is the security parameter.
Place, publisher, year, edition, pages
2014. no PART 1, 462-479 p.
Encryption, Randomness, Tampering, Random processes, Analytic technique, Cryptographic primitives, Encryption schemes, Identification protocol, Security parameters, Zero-knowledge protocols, Cryptography
Electrical Engineering, Electronic Engineering, Information Engineering
IdentifiersURN: urn:nbn:se:kth:diva-167864DOI: 10.1007/978-3-662-44371-2_26ScopusID: 2-s2.0-84905380508ISBN: 9783662443705OAI: oai:DiVA.org:kth-167864DiVA: diva2:821243
17 August 2014 through 21 August 2014, Santa Barbara, CA
QC 201506152015-06-152015-05-222015-06-15Bibliographically approved