Blockwise -Tampering Attacks on Cryptographic Primitives, Extractors, and Learners
Saeed Mahloujifar and Mohammad Mahmoody
Abstract
Austrin, Chung, Mahmoody, Pass and Seth (Crypto'14) studied the notion of bitwise -tampering attacks over randomized algorithms in which an efficient `virus' gets to control each bit of the randomness with independent probability in an online way. The work of Austrin et al. showed how to break certain `privacy primitives' (e.g., encryption, commitments, etc.) through bitwise -tampering, by giving a bitwise -tampering biasing attack for increasing the average of any efficient function by where is the variance of .
In this work, we revisit and extend the bitwise tampering model of Austrin et al. to blockwise setting, where blocks of randomness becomes tamperable with independent probability . Our main result is an efficient blockwise -tampering attack to bias the average of any efficient function mapping arbitrary to by regardless of how is partitioned into individually tamperable blocks . Relying on previous works, our main biasing attack immediately implies efficient attacks against the privacy primitives as well as seedless multi-source extractors, in a model where the attacker gets to tamper with each block (or source) of the randomness with independent probability . Further, we show how to increase the classification error of deterministic learners in the so called `targeted poisoning' attack model under Valiant's adversarial noise. In this model, an attacker has a `target' test data in mind and wishes to increase the error of classifying while she gets to tamper with each training example with independent probability an in an online way.
@misc{cryptoeprint:2017/950,
author = {Saeed Mahloujifar and Mohammad Mahmoody},
title = {Blockwise $p$-Tampering Attacks on Cryptographic Primitives, Extractors, and Learners},
howpublished = {Cryptology {ePrint} Archive, Paper 2017/950},
year = {2017},
url = {https://eprint.iacr.org/2017/950}
}
Note: In order to protect the privacy of readers, eprint.iacr.org
does not use cookies or embedded third party content.