Paper 2021/1270
Speak Much, Remember Little: Cryptography in the Bounded Storage Model, Revisited
Yevgeniy Dodis, Willy Quach, and Daniel Wichs
Abstract
The goal of the bounded storage model (BSM) is to construct unconditionally secure cryptographic protocols, by only restricting the storage capacity of the adversary, but otherwise giving it unbounded computational power. Here, we consider a streaming variant of the BSM, where honest parties can stream huge amounts of data to each other so as to overwhelm the adversary's storage, even while their own storage capacity is significantly smaller than that of the adversary. Prior works showed several impressive results in this model, including key agreement and oblivious transfer, but only as long as adversary's storage $m = O(n^2)$ is at most quadratically larger than the honest user storage $n$. Moreover, the work of Dziembowski and Maurer (DM) also gave a seemingly matching lower bound, showing that key agreement in the BSM is impossible when $m > n^2$. In this work, we observe that the DM lower bound only applies to a significantly more restricted version of the BSM, and does not apply to the streaming variant. Surprisingly, we show that it is possible to construct key agreement and oblivious transfer protocols in the streaming BSM, where the adversary's storage can be significantly larger, and even exponential $m = 2^{O(n)}$. The only price of accommodating larger values of $m$ is that the round and communication complexities of our protocols grow accordingly, and we provide lower bounds to show that an increase in rounds and communication is necessary. As an added benefit of our work, we also show that our oblivious transfer (OT) protocol in the BSM satisfies a simulation-based notion of security. In contrast, even for the restricted case of $m = O(n^2)$, prior solutions only satisfied a weaker indistinguishability based definition. As an application of our OT protocol, we get general multiparty computation (MPC) in the BSM that allows for up to exponentially large gaps between $m$ and $n$, while also achieving simulation-based security.
Metadata
- Available format(s)
- Category
- Foundations
- Publication info
- Preprint. MINOR revision.
- Keywords
- Bounded Storage Model
- Contact author(s)
- quach w @ northeastern edu
- History
- 2021-09-22: received
- Short URL
- https://ia.cr/2021/1270
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2021/1270, author = {Yevgeniy Dodis and Willy Quach and Daniel Wichs}, title = {Speak Much, Remember Little: Cryptography in the Bounded Storage Model, Revisited}, howpublished = {Cryptology {ePrint} Archive, Paper 2021/1270}, year = {2021}, url = {https://eprint.iacr.org/2021/1270} }