License: Creative Commons Attribution 3.0 Unported license (CC BY 3.0)
When quoting this document, please refer to the following
DOI: 10.4230/OASIcs.ICCSW.2014.83
URN: urn:nbn:de:0030-drops-47783
URL: http://dagstuhl.sunsite.rwth-aachen.de/volltexte/2014/4778/
Go to the corresponding OASIcs Volume Portal


Skorski, Maciej

On Recent Advances in Key Derivation via the Leftover Hash Lemma

pdf-format:
15.pdf (0.6 MB)


Abstract

Barak et al. showed how to significantly reduce the entropy loss, which is necessary in general, in the use of the Leftover Hash Lemma (LHL) to derive a secure key for many important cryptographic applications. If one wants this key to be secure against any additional short leakage, then the min-entropy of the source used with the LHL must be big enough. Recently, Berens came up with a notion of collision entropy that is much weaker than min-entropy and allows proving a version of the LHL with leakage robustness but without any entropy saving. We combine both approaches and extend the results of Barak et. al to the collision entropy. Summarizing, we obtain a version of the LHL with optimized entropy loss, leakage robustness and weak entropy requirements.

BibTeX - Entry

@InProceedings{skorski:OASIcs:2014:4778,
  author =	{Maciej Skorski},
  title =	{{On Recent Advances in Key Derivation via the Leftover Hash Lemma}},
  booktitle =	{2014 Imperial College Computing Student Workshop},
  pages =	{83--90},
  series =	{OpenAccess Series in Informatics (OASIcs)},
  ISBN =	{978-3-939897-76-7},
  ISSN =	{2190-6807},
  year =	{2014},
  volume =	{43},
  editor =	{Rumyana Neykova and Nicholas Ng},
  publisher =	{Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{http://drops.dagstuhl.de/opus/volltexte/2014/4778},
  URN =		{urn:nbn:de:0030-drops-47783},
  doi =		{10.4230/OASIcs.ICCSW.2014.83},
  annote =	{Keywords: Key derivation, Leftover Hash Lemma, leakage robustness}
}

Keywords: Key derivation, Leftover Hash Lemma, leakage robustness
Collection: 2014 Imperial College Computing Student Workshop
Issue Date: 2014
Date of publication: 08.10.2014


DROPS-Home | Fulltext Search | Imprint | Privacy Published by LZI