Simulating auxiliary inputs, revisited

From MaRDI portal
Publication:3179356

DOI10.1007/978-3-662-53641-4_7zbMATH Open1369.94567arXiv1503.00484OpenAlexW2478529919MaRDI QIDQ3179356FDOQ3179356


Authors: Maciej Skórski Edit this on Wikidata


Publication date: 21 December 2016

Published in: Theory of Cryptography (Search for Journal in Brave)

Abstract: For any pair (X,Z) of correlated random variables we can think of Z as a randomized function of X. Provided that Z is short, one can make this function computationally efficient by allowing it to be only approximately correct. In folklore this problem is known as emph{simulating auxiliary inputs}. This idea of simulating auxiliary information turns out to be a powerful tool in computer science, finding applications in complexity theory, cryptography, pseudorandomness and zero-knowledge. In this paper we revisit this problem, achieving the following results: �egin{enumerate}[(a)] We discuss and compare efficiency of known results, finding the flaw in the best known bound claimed in the TCC'14 paper "How to Fake Auxiliary Inputs". We present a novel boosting algorithm for constructing the simulator. Our technique essentially fixes the flaw. This boosting proof is of independent interest, as it shows how to handle "negative mass" issues when constructing probability measures in descent algorithms. Our bounds are much better than bounds known so far. To make the simulator (s,epsilon)-indistinguishable we need the complexity Oleft(scdot25ellepsilon2ight) in time/circuit size, which is better by a factor epsilon2 compared to previous bounds. In particular, with our technique we (finally) get meaningful provable security for the EUROCRYPT'09 leakage-resilient stream cipher instantiated with a standard 256-bit block cipher, like mathsfAES256.


Full work available at URL: https://arxiv.org/abs/1503.00484




Recommendations




Cites Work


Cited In (5)





This page was built for publication: Simulating auxiliary inputs, revisited

Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3179356)