22.04.2014 Views

a590003

a590003

a590003

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Multi-instance Security and Password-based Cryptography 13<br />

main GUESS P,m<br />

pw[1],...,pw[m]←$P<br />

pw ′ ←$B Test,Cor<br />

Ret ∧ m<br />

i=1 (pw′ [i] = pw[i])<br />

main saGUESS P,m,ρ<br />

pw[1],...,pw[m]←$P<br />

For i = 1 to m do<br />

For j = 1 to ρ do<br />

sa[i,j]←${0,1} s<br />

pw ′ ←$B Test,Cor (sa)<br />

Ret ∧ m<br />

i=1 (pw′ [i] = pw[i])<br />

proc. Test(i,pw)<br />

If (pw = pw[i]) then Ret true<br />

Ret ⊥<br />

proc. Test(pw,sa)<br />

For i = 1 to m do<br />

For j = 1 to ρ do<br />

If (pw,sa) = (pw[i],sa[i,j]) then<br />

Ret (i,j)<br />

Ret (⊥,⊥)<br />

proc. Cor(i)<br />

Ret pw[i]<br />

proc. Cor(i)<br />

Ret pw[i]<br />

Fig.3. An adaptive password-guessing game.<br />

the adversary’s complexity and of some simpler relevant parameters of a password<br />

sampler are desirable. One interesting case is samplers with high minentropy.<br />

Formally, we say that P has min-entropy µ if for all pw ′ it holds that<br />

Pr[pw = pw ′ ] ≤ 2 −µ over the coins used in choosing pw←$P.<br />

Theorem 6. Fix m ≥ q c ≥ 0 and a password sampler P with min-entropy<br />

µ. Let B be a (q t ,q c )-adversary for GUESS P,m making q i queries of the form<br />

Test(i,·) with q t = q 1 + ··· + q m . Let δ = q t /(m2 µ ) and let γ = (m − q c )/m.<br />

Then Adv guess<br />

P,m (B) ≤ e−m∆(γ,δ) where ∆(γ,δ) = γln( γ δ )+(1−γ)ln(1−γ 1−δ ). □<br />

Using∆(γ,δ) ≥ 2(γ−δ) 2 ,weseethattowintheguessinggameforq c corruptions,<br />

q t ≈ (m−q c )·2 µ Testqueriesarenecessary,andthebrute-forceattackisoptimal.<br />

Note that the above bound is the best we expect to prove: Indeed, assume for a<br />

moment that we restrict ourselves to adversaries that want to recover a subset<br />

of m−q c passwords, without corruptions, and make q t /m queries Test(i,·), for<br />

each i, which are independent from queries Test(j,·) for other j ≠ i. Then, each<br />

individual passwordis found,independently, with probabilityatmostq t /(m·2 µ ),<br />

and if one applies the Chernoffbound, the probabilitythat a subsetofsize m−q c<br />

of the passwords are retrieved is upper bounded by e −m∆(γ,δ) . In our case, we<br />

have additional challenges: Foremost, queries for each i are not independent.<br />

Also, the number of queries may not be the same for each index i. And finally,<br />

we allow for corruption queries.<br />

The full proof of Theorem 6 is given in [6]. At a high level, it begins by<br />

showing how to move to a simpler setting in which the adversary wins by recovering<br />

a subset of the passwords without the aid of a corrupt oracle. The<br />

resulting setting is an example of a threshold direct product game. This allows<br />

us to apply a generalized Chernoff bound due to Panconesi and Srinivasan [31]<br />

(see also [20]) that reduces threshold direct product games to (non-threshold)<br />

direct product games. Finally, we apply an amplification lemma due to Maurer,<br />

Pietrzak, and Renner [25] that yields a direct product theorem for the password<br />

guessing game. Let us also note that using the same technique, the better<br />

14. Multi-Instance Security

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!