Repository logo

Infoscience

  • English
  • French
Log In
Logo EPFL, École polytechnique fédérale de Lausanne

Infoscience

  • English
  • French
Log In
  1. Home
  2. Academic and Research Output
  3. Conferences, Workshops, Symposiums, and Seminars
  4. The Chaining Lemma and Its Application
 
conference paper

The Chaining Lemma and Its Application

Damgard, Ivan
•
Faust, Sebastian
•
Mukherjee, Pratyay
Show more
Lehmann, A
•
Wolf, S
2015
Information Theoretic Security (Icits 2015)
8th International Conference on Information-Theoretic Security (ICITS)

We present a new information-theoretic result which we call the Chaining Lemma. It considers a so-called "chain" of random variables, defined by a source distribution X-(0) with high min-entropy and a number (say, t in total) of arbitrary functions (T-1,...,T-t) which are applied in succession to that source to generate the chain X-(0) (sic) X-(1) (sic) X-(2)...(sic) X-(t). Intuitively, the Chaining Lemma guarantees that, if the chain is not too long, then either (i) the entire chain is "highly random", in that every variable has high min-entropy; or (ii) it is possible to find a point j (1 <= j <= t) in the chain such that, conditioned on the end of the chain i.e. X-(j) (sic) X(j+1)...(sic) X-(t), the preceding part X-(0) (sic) X-(1)...(sic) X-(j) remains highly random. We think this is an interesting information-theoretic result which is intuitive but nevertheless requires rigorous case-analysis to prove. We believe that the above lemma will find applications in cryptography. We give an example of this, namely we show an application of the lemma to protect essentially any cryptographic scheme against memorytampering attacks. We allow several tampering requests, the tampering functions can be arbitrary, however, they must be chosen from a bounded size set of functions that is fixed a priori.

  • Details
  • Metrics
Type
conference paper
DOI
10.1007/978-3-319-17470-9_11
Web of Science ID

WOS:000362493000012

Author(s)
Damgard, Ivan
Faust, Sebastian
Mukherjee, Pratyay
Venturi, Daniele
Editors
Lehmann, A
•
Wolf, S
Date Issued

2015

Publisher

Springer-Verlag Berlin

Publisher place

Berlin

Published in
Information Theoretic Security (Icits 2015)
ISBN of the book

978-3-319-17470-9

978-3-319-17469-3

Total of pages

16

Series title/Series vol.

Lecture Notes in Computer Science

Volume

9063

Start page

181

End page

196

Editorial or Peer reviewed

REVIEWED

Written at

EPFL

EPFL units
IINFCOM  
Event nameEvent placeEvent date
8th International Conference on Information-Theoretic Security (ICITS)

Univ Svizzera italiana, Lugano, SWITZERLAND

MAY 02-05, 2015

Available on Infoscience
December 2, 2015
Use this identifier to reference this record
https://infoscience.epfl.ch/handle/20.500.14299/121359
Logo EPFL, École polytechnique fédérale de Lausanne
  • Contact
  • infoscience@epfl.ch

  • Follow us on Facebook
  • Follow us on Instagram
  • Follow us on LinkedIn
  • Follow us on X
  • Follow us on Youtube
AccessibilityLegal noticePrivacy policyCookie settingsEnd User AgreementGet helpFeedback

Infoscience is a service managed and provided by the Library and IT Services of EPFL. © EPFL, tous droits réservés