In this work, we provide the first constant rate LRSS (for the general access structure) and LRNMSS (for the threshold access structure) schemes that tolerate such joint and adaptive leakage in the information-theoretic setting. We show how to make use of our constructions to also provide constant rate constructions of leakage-resilient (and non-malleable) secure message transmission.
We obtain our results by introducing a novel object called Adaptive Extractors. Adaptive extractors can be seen as a generalization of the notion of exposure-resilient extractors (Zimand, CCC 2006). Such extractors provide security guarantees even when an adversary obtains leakage on the source of the extractor after observing the extractor output. We make a compelling case for the study of such extractors by demonstrating their critical use for obtaining adaptive leakage and believe that such an object will be of independent interest.
Category / Keywords: foundations / Information theoretic Cryptography, Non-malleability, Leakage Resilient Secret Sharing, Non-malleable Codes, Randomness Extractors, Non-malleable Secret Sharing Date: received 9 Oct 2020 Contact author: sruthi sekar1 at gmail com,oslbhavana@gmail com,bhavana@iisc ac in,nichandr@microsoft com Available format(s): PDF | BibTeX Citation Version: 20201009:113939 (All versions of this report) Short URL: ia.cr/2020/1252