TY - GEN
T1 - Computational Irrelevancy
T2 - 17th International Workshop on Security, IWSEC 2022
AU - Heseri, Nariyasu
AU - Nuida, Koji
N1 - Publisher Copyright:
© 2022, The Author(s), under exclusive license to Springer Nature Switzerland AG.
PY - 2022
Y1 - 2022
N2 - Due to the fact that classical computers cannot efficiently obtain random numbers, it is common practice to design cryptosystems in terms of real random numbers and then replace them with cryptographically secure pseudorandom ones for concrete implementations. However, as pointed out by the previous work (Nuida, PKC 2021), this technique may lead to compromise of security in secure multiparty computation (MPC) protocols, due to the property that a seed for a pseudorandom generator (PRG) is visible by an adversary in the context of MPC. Although this work suggested to use information-theoretically secure protocols (together with PRGs with high min-entropy) to alleviate the problem, yet it is preferable to base the security on computational assumptions rather than the stronger information-theoretic ones. By observing that the contrived constructions in the aforementioned work use MPC protocols and PRGs that are closely related to each other, we notice that it may help to alleviate the problem by using protocols and PRGs that are “unrelated” to each other. In this paper, we propose a notion called “computational irrelevancy” to formalise the term “unrelated” and under this condition provide a security guarantee under computational assumptions.
AB - Due to the fact that classical computers cannot efficiently obtain random numbers, it is common practice to design cryptosystems in terms of real random numbers and then replace them with cryptographically secure pseudorandom ones for concrete implementations. However, as pointed out by the previous work (Nuida, PKC 2021), this technique may lead to compromise of security in secure multiparty computation (MPC) protocols, due to the property that a seed for a pseudorandom generator (PRG) is visible by an adversary in the context of MPC. Although this work suggested to use information-theoretically secure protocols (together with PRGs with high min-entropy) to alleviate the problem, yet it is preferable to base the security on computational assumptions rather than the stronger information-theoretic ones. By observing that the contrived constructions in the aforementioned work use MPC protocols and PRGs that are closely related to each other, we notice that it may help to alleviate the problem by using protocols and PRGs that are “unrelated” to each other. In this paper, we propose a notion called “computational irrelevancy” to formalise the term “unrelated” and under this condition provide a security guarantee under computational assumptions.
UR - http://www.scopus.com/inward/record.url?scp=85136963800&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85136963800&partnerID=8YFLogxK
U2 - 10.1007/978-3-031-15255-9_11
DO - 10.1007/978-3-031-15255-9_11
M3 - Conference contribution
AN - SCOPUS:85136963800
SN - 9783031152542
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 208
EP - 223
BT - Advances in Information and Computer Security - 17th International Workshop on Security, IWSEC 2022, Proceedings
A2 - Cheng, Chen-Mou
A2 - Akiyama, Mitsuaki
PB - Springer Science and Business Media Deutschland GmbH
Y2 - 31 August 2022 through 2 September 2022
ER -