Iterated group products and leakage resilience against NC1

Eric Miles
{"title":"Iterated group products and leakage resilience against NC1","authors":"Eric Miles","doi":"10.1145/2554797.2554822","DOIUrl":null,"url":null,"abstract":"We show that if NC1 ≠ L, then for every element α of the alternating group At, circuits of depth O(log t) cannot distinguish between a uniform vector over (At)t with product = α and one with product = identity. Combined with a recent construction by the author and Viola in the setting of leakage-resilient cryptography [STOC '13], this gives a compiler that produces circuits withstanding leakage from NC1 (assuming NC1 ≠ L). For context, leakage from NC1 breaks nearly all previous constructions, and security against leakage from P is impossible. We build on work by Cook and McKenzie [J. Algorithms '87] establishing the relationship between L = logarithmic space and the symmetric group St. Our techniques include a novel algorithmic use of commutators to manipulate the cycle structure of permutations in At.","PeriodicalId":382856,"journal":{"name":"Proceedings of the 5th conference on Innovations in theoretical computer science","volume":"16 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"18","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 5th conference on Innovations in theoretical computer science","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2554797.2554822","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 18

Abstract

We show that if NC1 ≠ L, then for every element α of the alternating group At, circuits of depth O(log t) cannot distinguish between a uniform vector over (At)t with product = α and one with product = identity. Combined with a recent construction by the author and Viola in the setting of leakage-resilient cryptography [STOC '13], this gives a compiler that produces circuits withstanding leakage from NC1 (assuming NC1 ≠ L). For context, leakage from NC1 breaks nearly all previous constructions, and security against leakage from P is impossible. We build on work by Cook and McKenzie [J. Algorithms '87] establishing the relationship between L = logarithmic space and the symmetric group St. Our techniques include a novel algorithmic use of commutators to manipulate the cycle structure of permutations in At.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
迭代组产品和抗NC1泄漏弹性
我们证明了如果NC1≠L,那么对于交替群At中的每一个元素α,深度为O(log t)的电路不能区分(At)t上积= α的一致向量和积=恒等的一致向量。结合作者和Viola最近在防泄漏密码学[STOC '13]设置中的构造,这给出了一个编译器,该编译器可以产生耐受NC1泄漏的电路(假设NC1≠L)。就上下文而言,NC1泄漏几乎破坏了所有先前的构造,并且不可能防止P泄漏。我们以库克和麦肯齐的工作为基础[J]。算法[87]建立了L =对数空间和对称群st之间的关系。我们的技术包括一种使用换向子来操纵At中置换的循环结构的新算法。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
On the automorphism groups of strongly regular graphs I Coordination mechanisms from (almost) all scheduling policies Session details: Session 10: 10:30--10:40 Cryptogenography Rational arguments: single round delegation with sublinear verification
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1