International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

Disappearing Cryptography in the Bounded Storage Model

Authors:
Jiaxin Guan
Mark Zhandry
Download:
DOI: 10.1007/978-3-030-90453-1_13
Search ePrint
Search Google
Abstract: In this work, we study disappearing cryptography in the bounded storage model. Here, a component of the transmission, say a ciphertext, a digital signature, or even a program, is streamed bit by bit. The stream is too large for anyone to store in its entirety, meaning the transmission effectively disappears once the stream stops. We first propose the notion of online obfuscation, capturing the goal of disappearing programs in the bounded storage model. We give a negative result for VBB security in this model, but propose candidate constructions for a weaker security goal, namely VGB security. We then demonstrate the utility of VGB online obfuscation, showing that it can be used to generate disappearing ciphertexts and signatures. All of our applications are not possible in the standard model of cryptography, regardless of computational assumptions used.
Video from TCC 2021
BibTeX
@article{tcc-2021-31549,
  title={Disappearing Cryptography in the Bounded Storage Model},
  booktitle={Theory of Cryptography;19th International Conference},
  publisher={Springer},
  doi={10.1007/978-3-030-90453-1_13},
  author={Jiaxin Guan and Mark Zhandry},
  year=2021
}