Research Online Research Online Continuous leakage resilient lossy trapdoor functions Continuous leakage resilient lossy trapdoor functions

Abstract Lossy trapdoor functions (LTFs) were first introduced by Peikert and Waters (STOC'08). Since their introduction, lossy trapdoor functions have found numerous applications. They can be used as tools to construct important cryptographic primitives such as injective one-way trapdoor functions, chosen-ciphertext-secure public key encryptions, deterministic encryptions, et al. In this paper, we focus on the lossy trapdoor functions in the presence of continuous leakage. We introduce the new notion of updatable lossy trapdoor functions (ULTFs) and give their formal definition and security properties. Based on these, we extend the security model to the LTFs against continuous leakage when the evaluation algorithm is leakage resilient. Under the standard DDH assumption and DCR assumption, respectively, we show two explicit lossy trapdoor functions against continuous leakage in the standard model. In these schemes, using the technology of matrix kernel, the trapdoor can be refreshed at regular intervals and the adversaries can learn unbounded leakage information on the trapdoor along the whole system life. At the same time, we also show the performance of the proposed schemes compared with the known existing continuous leakage resilient lossy trapdoor functions. Abstract: Lossy trapdoor functions (LTFs) were ﬁrst introduced by Peikert and Waters (STOC’08). Since their introduction, lossy trapdoor functions have found numerous applications. They can be used as tools to construct important cryptographic primitives such as injective one-way trapdoor functions, chosen-ciphertext-secure public key encryptions, deterministic encryptions, et al. In this paper, we focus on the lossy trapdoor functions in the presence of continuous leakage. We introduce the new notion of updatable lossy trapdoor functions (ULTFs) and give their formal deﬁnition and security properties. Based on these, we extend the security model to the LTFs against continuous leakage when the evaluation algorithm is leakage resilient. Under the standard DDH assumption and DCR assumption, respectively, we show two explicit lossy trapdoor functions against continuous leakage in the standard model. In these schemes, using the technology of matrix kernel, the trapdoor can be refreshed at regular intervals and the adversaries can learn unbounded leakage information on the trapdoor along the whole system life. At the same time, we also show the performance of the proposed schemes compared with the known existing continuous leakage resilient lossy trapdoor functions.


Introduction
Lossy trapdoor functions (LTFs) were firstly introduced by Peikert and Waters (STOC 2008) [1]. A collection of lossy trapdoor functions can be divided into two computationally indistinguishable families. The first family is the injective functions which can be efficiently inverted using a trapdoor. The other family is the lossy functions under which the image size of these functions is significantly smaller than the size of their domain. Hence, the lossy functions loose a lot of information about their input. Additionally, injective and lossy functions are efficiently samplable.
Since their introduction, lossy trapdoor functions have found numerous applications. It can be used as a tool to construct important cryptographic primitives such as injective one-way trapdoor functions, chosen plaintext secure (CPA) and chosen ciphertext secure (CCA) public key encryptions (PKE) in the standard model and oblivious transfer (OT). In addition, LTFs have already found various other applications, including deterministic PKE schemes [2,3], OAEP-based PKE schemes, "hedged" PKE schemes for protecting against bad randomness [4], selective opening attack (SOA) secure PKE scheme [5] and efficient non-interactive string commitments [6].
Leakage-resilient cryptographic systems have received a lot of attention in recent years. The feature of a leakage resilient cryptosystem is that it remains secure even when some secret internal information, including the secret key, is leaked to the adversary. In the traditional security analysis, security models treat such internal information as perfectly hidden from the adversary. With the development of various side-channel attacks, it is clear that the traditional view is inconsistent with some physical realities [7]. To stand against such attacks, cryptographic researchers have paid much to the design of leakage-resilient cryptosystems [8][9][10][11][12][13][14].
The continuous leakage resilient (CLR) model was introduced by Dodis et al. [15] and Brakerski et al. [16]. It is a more powerful security model since it allows the adversary to learn unbounded leakage on the system's secret memory during the main operation of the system. There are a variety of CLR schemes, including CLR one-way relations [15,17], CLR probability PKE [16][17][18], CLR Identity-based encryption (IBE) [16,19], CLR secure multiparty computation [20], CLR interactive proofs [21], CLR signatures, CLR identification schemes and CLR authenticated key agreement protocols [15].
To withstand continuous leakage, the secret key must be continuously refreshed requiring that: (1) the functionality of the cryptosystem is preserved even after updating the keys an arbitrary number of times; (2) one can not combine the leaked values from different versions of the secret key to break the system. Such a model of invisible key updates was formalized by Alwen et al. [22], where one assumes that there exists a trusted and leak-free device who uses some updatable key uk to continuously refresh the secret key in a way that still satisfies the above two requirements. The leak-free device is only present during the key updates, but not during the normal operations just like decryption when the leakage actually happens. In [17], they informally refer to this CLR model of invisible key updates as the floppy model where there is assumed an external leak-free storage that is only present for refreshing operations.

Our Motivation
Lossy trapdoor functions play an important role in public key cryptosystems. Its special construction and properties decide that it is the building block of the cryptosystems. As we all know, the CLR model is the most demanding security model in the cryptosystem. Therefore, designing lossy trapdoor functions against continuous leakage is an interesting and practical topic.
Based on the work of Brakerski et al. [16], Koppula et al. [23] firstly gave the security model of lossy trapdoor functions under continuous leakage and presented the lossy trapdoor functions against continuous leakage, which is a base of the deterministic public key encryption against continuous leakage. Their security model is mainly based on the all-but-one (ABO) LTFs of Peikert and Waters in [1]. Under this model, their proposal is not concise and efficient in which they utilized many bi-linear parings to encrypt only one bit. Hence, their LTFs against continuous leakage is so complicated that it can not be used in practice efficiently. Qin and Liu et al. first introduced the leakage resilient lossy trapdoor functions [24]. In their work, the structure of LTFs is slightly different from the one introduced by Peikert and Waters in [1]. In [1], the evaluation key of a LTF includes the public parameters. However, in [24], they distinguish between the public parameters and the evaluation key with two independent algorithms. However, the slight change on the constructure did not have an influence on their scheme to satisfy the security properties of LTFs.
Motivated by the work of Qin and Liu et al. [24], we focus on how to construct efficient and practical LTFs against continuous leakage in the floppy model.

Our Contribution
In this work, our contribution is described as follows:

1.
We introduce the new notion of updatable lossy trapdoor functions (ULTFs) based on the LTF structure of [24], where the key sample algorithm is divided into two independent steps. In the first algorithm, it takes in the security parameter 1 κ and outputs a public parameter pp and the trapdoor td; in the second algorithm, it takes in pp and injective/lossy parameter b ∈ {0, 1} and outputs the injective/lossy evaluation key ek, which is related to b. At the same time, we also give the security requirements such as the indistinguishability of injective/lossy evaluation key, etc. When the evaluation algorithm F is leakage resilient, we can achieve the LTFs against continuous leakage, which we denote as CLR-LTFs for short. With the help of the new notion of ULTFs, we achieve the security model of CLR-LTFs in the floppy model. When the adversary is equipped with the public parameter and additional information from the leakage oracle during each time period, it still is not able to distinguish the injective and lossy evaluation keys.

2.
Based on the ElGamal-like PKE scheme in vector form [17,25,26], which is additively homomorphic and CPA-secure against continuous leakage, we achieve two proposals of CLR-LTFs under the standard Decisional Diffie-Hellman (DDH) and Decisional Composite Residuosity (DCR) assumptions, respectively. In the two CLR-LTF schemes, with the public parameters and the evaluation key fixed, we utilize the technology of the matrix kernel to complete the refreshment of the trapdoor. Our first proposal is obtained by embedding the CLR ElGamal-like PKE scheme into the matrix-based LTFs of [1] n times, where the ciphertexts constitute the rows of the matrix R and the columns of the matrix Q, respectively. Through the n-time expansion of the secret key of a single ElGamal-like PKE scheme, the leakage rate of the achieved CLR-LTF is decreased from 1 − o(1) into 1 n for maintaining the indistinguishability of the injective or lossy evaluation keys. In order to improve the leakage rate in each time period, we extend the group from a prime order group to a composite order group and get the second CLR-LTFs based on the DCR assumption, where the leakage rate can arrive at 1.

3.
Compared with the other known CLR-LTFs constructions introduced by Koppula et al. [23], we give an efficiency comparison as below (Table 1). |m| denotes the length of the encrypted massage; n ≈ Θ(κ) where κ is the security parameter; N is an RSA modulus which will be explained by detail in Section 6; α ≥ 1 is a nature number; DDH means Decisional Diffie-Hellman assumption; SXDH means Symmetric External Diffie-Hellman assumption; DCR means Decisional Composite Residuosity assumption.

Organization
The rest of the article is organized as follows. In Section 2, we review some preliminaries which would be used in this paper. In Section 3, we introduce the new notion of updatable lossy trapdoor functions and present the formal definition and security properties. Meanwhile, we extend the security model to continuous leakage. Next, we introduce the CLR ElGamal-like PKE scheme with some important security properties which will be borrowed for the following concrete CLR-LTFs in Section 4. Then, we present two explicit CLR-LTFs. The first CLR-LTF under the DDH assumption in the prime order group is shown in Section 5. The second CLR-LTF under the DCR assumption in the composite order group is presented in Section 6, respectively. We also prove that these schemes are satisfying the security properties that have been given in Section 4. Lastly, we get a conclusion and direct the future work in Section 7.

Notion: negl(κ) is negligible function with security parameter κ;
[t] denotes the set {1, 2, · · · , t}, where t is a natural number; logx denotes the discrete logarithm of x in the base 2; Rk i (Z n×m p ) denotes the uniform distribution on any n-by-m matrices over Z p of rank i.

Preliminaries
In this section, we present some basic tools that will be used in our constructions and security proofs. We formally state some decisional assumptions and present some results about the leftover hash lemma.

Decisional Diffie-Hellman (DDH) Assumption
We assume a probability polynomial time (PPT) algorithm G(1 κ ) which takes as input 1 κ and outputs a tuple of G = (G, p, g), where G is a cyclic group of prime order p and g is a generation of G. The Decisional Diffie-Hellman (DDH) assumption holds iff for any PPT adversary A, where g 1 , g 2 ∈ G and r ∈ Z q , r ∈ Z q \ {r}. We can extend the standard DDH assumption to the following form. For a group (G, p, g) and random elements g 1 , g 2 , · · · , g l ∈ G, we define the two sets: If x ∈ L, the corresponding r is called a witness for x. At the same time, (X, L) forms a subset membership problem [26] whose hardness is subject to the DDH assumption [25].
On the other hand, Ref. [26] showed that the DDH assumption is equivalent to the assumption that it is hard to distinguish between an n-by-m matrix X with rank i ≥ 1 and one with rank j > i in the exponent of a generator g of a prime order group G.

Rank Hiding Assumption
Following the parameters of the DDH assumption, let Rk i (Z n×m p ) denote the uniform distribution on all n-by-m matrices over Z p of rank i. The rank hiding assumption [17] holds iff for any PPT adversary A.

Extended Rank Hiding Assumption
Based on the rank hiding assumption, the extended rank hiding assumption [17] states that, for any PPT adversary A, the advantage , where m, n ∈ N, j > i ∈ N and t ≤ min{n, m}−max{i, j}.

Decisional Composite Residuosity (DCR) Assumption
We assume a group Z * N α+1 is a multiplicative group where s ≥ 1 is an integer. In addition, the integer N = PQ is an RSA modulus, which means that P and Q are odd primes of equivalent bit length. The decisional composite residuosity (DCR) assumption holds on the group for any PPT adversary A, where g ∈ G is chosen at random (where G is a cyclic group of order N α ) and T := 1 + N(modN α+1 ).

Generalized Leftover Hash Lemma
The statistical distance between two random variables X and Y over a finite domain Ω is We use the notion of average min-entropy, which captures the remaining unpredictability of a random variable X conditioned on another random variable Y, formally defined as: where E y∈Y denotes the expected value over all values of Y.
Lemma 1 [27]. For any random variables X, Y, Z, if Y has 2 r possible values, then In particular, Definition 1 [27]. A function Ext : X × {0, 1} t → Y is an average-case (m, )-strong extractor if, for all pairs of random variables (X, Z) such that X ∈ X and H ∞ (X|Z) ≥ m, it holds that where S is uniform in {0, 1} t and U Y is uniform over Y.

Definition 2 (Universal Hashing).
A family H, consisting of deterministic functions h : X → Y, is a universal hash family if, for any Lemma 2 (Generalized Leftover Hash Lemma) [27]. Assume that the family H = {H k : X → Y } k∈K is a universal hash family. Then, for any two random variables X, Z and k ∈ K, it holds that This lemma implies that any universal hash functions are good extractors. For two random variables X and Y, a family of universal hash functions {H k : X → Y } k∈K is an average-case (m, )-strong extractor Ext : X × K → Y as long asH ∞ (X|Z) ≥ m and log|Y | ≤ m − 2log(1/ ) + 2.

Updatable Lossy Trapdoor Function
In this section, we will introduce the new notion of updatable lossy trapdoor functions (ULTFs). Though Koppula et al. [23] has introduced a notion of LTFs resilient to continual memory leakage, their notion was mainly based on the all-but-one (ABO) LTFs of Peikert and Waters in [1]. The new notion, which will be presented as follows, is mainly based on the LTFs structure of Qin and Liu et al. [24], which is slightly different from the one introduced by Peikert and Waters in [1]. In [1], the evaluation key of a LTF includes the public parameters. However, in [24], they distinguish between the public parameters and the evaluation key with two independent algorithms. As a result, the change in the structure does not have any influence on the security. Based on the new notion, we can extend the ULTFs to CLR-LTFs naturally when the evaluation algorithm is leakage resilient.

Definition of Updatable Lossy Trapdoor Functions
At first, we give some related functions about the security parameter κ: Now, we introduce the new notion of updatable lossy trapdoor functions.
Public Parameter. G(1 κ ): It is a probabilistic PTA which takes in the security parameter 1 κ and outputs the public parameter and the trapdoor (pp, td).

2.
Public Parameter. S(pp, b): It is a probabilistic PTA which takes in the public parameter pp and b ∈ {0, 1} and samples an evaluation key ek which is also called the function index.

3.
Evaluation. F(ek, x): It is a deterministic PTA which takes in the evaluation key ek and x ∈ {0, 1} d and outputs the image y.

4.
Inversion. F −1 (td, y): It is a deterministic PTA which takes in the image y and the trapdoor td and outputs x ∈ {0, 1} d or ⊥.

5.
Update. U(uk, td): It is a probabilistic PTA which takes in the updatable key uk and the original trapdoor td and outputs the updated trapdoor td such that |td| = |td |.

Basic Properties
We require that the ULTF (G, S, F, F −1 , U) has some basic properties, indicating its correctness an hardness requirements:

•
Correctness. For all (PP, td) ← G(1 κ ), all ek ← S(pp, 1) and all x ∈ {0, 1} d , it holds that F −1 (td, F(ek, x)) = x, which is the preimage of y. On the other hand, it requires that, with the fixed public parameter pp and the evaluation key ek, the updated trapdoor td can also recover the preimage x of y correctly in the injective mode, i.e., it holds that F −1 (td , F(ek, x)) = x. • Injective/Lossy. For the third evaluation algorithm F(ek, ·), it requires that, for any ek ← S(pp, 1), the function F(ek, ·) is in the injective mode; and for any ek ← S(pp, 0) the function F(ek, ·) is in the lossy mode. The image size of the lossy function F(ek, x) is at most 2 d−k . Even when the evaluation F(ek, x) is in the injective mode, it requires that it can be inverted to the correct preimage using either the trapdoor td or any of its polynomial frequency updated trapdoor td .

•
Indistinguishability. For the second public parameter algorithm S(pp, b), the two evaluation keys ek respectively produced by S(pp, 1) and S(pp, 0) are computationally indistinguishable even after the trapdoor updates.

Extension
For the particular structure, the ULTFs can be viewed as a special lossy trapdoor function which served as a fundamental tool in constructing cryptographic primitives in both leakage-free and leaky settings. Here, if we combine the ULTF with the leakage property efficiently, we can achieve the continuous leakage resilient (CLR) LTFs. Based on the new notion of ULTFs, we give the security model of the CLR-LTFs as follows.
We consider the security model in the floppy model [17]. This means that during the trapdoor update, there is leak-free device available and between two trapdoor updates there is bounded leakage about the trapdoor (see [17] for more details).

Definition 4 (Lossy Trapdoor Functions against Continuous Leakage).
We say that ULTFs (G, S, F, F −1 , U) is a collection of continuous λ-bit (weak) leakage resilient (d, k)-LTFs (denoted λ-CLR-LTFs) in the floppy model if the ULTFs satisfy the basic properties above, and, for any PPT λ-key leakage adversary A = (A 1 , A 2 ), the advantage where the experiment Exp λ−CLR ULTF,A (κ, γ) (γ ∈ {0, 1}) is described as: Remark 1. In this security model, the adversary is only allowed to obtain leakage before it can see the evaluation key ek; therefore, the security of CLR-LTF in this paper is weak key leakage.

ElGamal-Like Public Key Encryption Scheme
Briefly, we introduce the ElGamal-like Encryption scheme which will be elegantly embedded into the following continuous leakage resilient LTFs. In addition, we will utilize some good algebraic properties of this cryptographic structure in the following. For the security parameter, κ, G = (G, p, g) ← G(1 κ ). The scheme is run in group G with prime order p, for some negligible = (κ) set l = 2 + λ+2log(1/ )−2 logp . The ElGamal-like PKE (KeyGen,Encrypt,Decrypt) is operated as follows:

1.
KeyGen(1 κ ): Run G = (G, p, g) ← G(1 κ ). Choose vector w ∈ Z l p and s ∈ Z l p and let h = g w,s ∈ G. The public key is pk = (G, p, g, g w , h). The secret key is set to sk = s.

2.
Encrypt(pk, m): Given a public key pk = (G, p, g, g w , h) along with a message m ∈ G, pick a random scalar r ∈ Z q uniformly at random and output the ciphertext c = (c 1 , c 2 ) = (g rw , h r · m).
The correctness holds directly with h r = g r w,s = g rw,s . Evidently, the above scheme is a variant of the ElGamal public key encryption in vector form. On the other hand, it also can been seen as the BHHO (Boneh, Halevi, Hamburg, Ostrovsky) public key encryption [25] when s ∈ {0, 1} n . As we all know, this primitive has some good cryptographic properties. We will use these properties in our LTFs against continuous key leakage.
From the leakage resilient aspect, Ref. [25,26] showed that, given the public key and any λ bits of leakage,H(sk|(pk, λ)) ≥ logp + 2log(1/ ) − 2. The leftover hash lemma provides that, with overwhelming probability over the choice of c 1 ∈ X \ L, it holds that h r is -close to the uniform distribution over G.

Lemma 3.
If the DDH assumption is hard in the p-prime order group G, then the above scheme is a λ-LR-CPA secure PKE scheme as long as the leakage parameter λ ≤ (l − 2)log(p) − 2log(1/ ) + 2, where = (κ) is some negligible function about the security parameter κ.
From the continuous leakage resilient aspect, Ref. [17] showed that, with the updated key w ∈ Z l p , we can update the secret key with sk = sk + β, where β ∈ kernal(w). With the fixed public key, the updated key sk can also decrypt the ciphertext correctly. Combined with the above lemma, with the help of the (extended) rank hiding assumption, the above scheme is a λ-CLR-CPA secure PKE scheme.

Lemma 4.
Under the extended rank hinging assumption and the DDH assumption for G, then the above scheme is a λ-CLR-CPA secure PKE scheme in the floppy model as long as the leakage parameter λ ≤ (l − 2)log(p) − 2log(1/ ) + 2, where = (κ) is some negligible function about the security parameter κ.

Continuous Leakage Resilient LTF from the DDH Assumption
In this section, based on the ElGamal-like Encryption scheme, we show a lossy trapdoor function against continuous trapdoor leakage.

The Scheme
In this section, we show how to construct continuous leakage resilient lossy trapdoor function (CLR-LTF) from the continuous leakage resilient CPA-secure ElGamal-like PKE. . The construction CLR-TDF=(G, S, F, F −1 , U) is presented as follows: 1.

2.
S(pp, b): Given b ∈ {0, 1}. For i ∈ [n], let R i = (g r i 1 , g r i 2 , · · · , g r i l ) ∈ L with a witness r i ∈ Z p independently at random.
When b = 1, we say it is in injective mode; otherwise, let g 0 = 1 G and we say it is in lossy mode. At last, the evaluation key is ek = (R, Q).

Correctness
• Since the updated trapdoor is td = ( For any evaluation key ek and ∀i ∈ [n], there is Since in injective mode (i.e., b = 1), g bx i = g x i holds and the correctness of F and F −1 follows.
Proof. Firstly, we prove the lossiness of the proposed scheme is still n−logp bits after each trapdoor update.

Lossiness.
In the lossy mode, after each trapdoor update, it holds that Therefore, the evaluation key Q in the lossy mode (i.e., g w,s 1 ·r 1 g w,s 1 ·r 2 · · · g w,s 1 ·r n g w,s 2 ·r 1 g w,s 2 ·r 2 · · · g w,s 2 ·r n . . . . . . . . . . . . g w,s n ·r 1 g w,s n ·r 2 · · · g w,s n ·r n w, s 1 · r 1 w, s 1 · r 2 · · · w, s 1 · r n w, s 2 · r 1 w, s 2 · r 2 · · · w, s 2 · r n . . . . . . . . . . . . w, s n · r 1 w, s n · r 2 · · · w, s n · r n Hence, Q is a matrix of rank 1 since the i-th column is r i /r 1 times of the first column for all i ∈ [n] and i = 1. Therefore, the image of F has size at most logp. The lossiness is n−logp bits. In the following, we give the lemma to support the theorem. Based on the λ-CLR-CPA-security of the ElGamal-like public key encryption in the floppy model (Section 4 Lemma 4), the proposed lossy trapdoor function can satisfy the indistinguishability between the injective and lossy functions tolerating at most λ-bit leakage about the trapdoor at each time period, where λ ≤ (l − 2)logp − 2log(1/ ) + 2.
Proof. Let F inj and F loss be the distributions on the injective evaluation key and the lossy evaluation key, respectively. Let F i be the distribution which is identical to the distribution F inj except for letting the latter i-th main diagonal element b = 0 in matrix Q. In evidence, F 0 = F inj , which is the distribution on injective evaluation key and F n = F loss , which is the distribution on the lossy evaluation key. Therefore, to prove that F inj and F loss are computationally indistinguishable, it is enough to prove that F i−1 and F i are computationally indistinguishable for any i ∈ [n].
In the following, we show that any distinguisher D of the two distributions F i−1 and F i can be used to attack the λ-CLR-CPA security of the ElGmal-like PKE scheme. The game is played between a simulator S and the distinguisher D. • Given the public key pk = (G, p, g, g 1 , g 2 , · · · , g l , h) of ElGamal-like PKE, the simulator S chooses a random index i * ∈ [n]. For i = [n\i * ], the pairs (s i , h i ) are produced the same as in ElGamal-like PKE. For i = i * , let h i * = h and s i = sk, where the secret key sk is correlated with the challenge public key pk. Finally, S sends pp = (G, p, g, g 1 , g 2 , · · · , g l , h 1 , h 2 , · · · , h n ) to the distinguisher D. • Consequently, the simulator S simulates D's continuous leakage queries as follows. Suppose that there are polynomial t = t(κ) times continuous trapdoor leakage queries. Set td 0 = (s 1 , s 2 , · · · , s n ) and . We know that the leakage information is a function of td i = (s 1 , s 2 , · · · , s n ) + kernal i (w)(i ∈ [t]) and the simulator S knows all s i except for s i * . According to D's leakage query function f of td i = (s 1 , s 2 , · · · , s n ) + kernal i (w)(i ∈ [t]), the simulator S adapts f as a function of s i * and presents the function to its own leakage oracles as long as the length of the whole output of f is smaller than λ bits, which is the upper bound of the leakage information of the updatable ElGamal-like PKE scheme. At last, the simulator S achieves the value f (td i )(i ∈ [t]) returned from its leakage oracle and then responds with D's leakage queries.

-
For i = [n\i * ] and j ∈ [n], compute h r i j using the same witness r i . For The simulator S sends ek = (R, Q) to A. We can see that when e * is the encryption of g, the simulator S simulates a function index based on the distribution F i * −1 perfectly. On the other hand, when e * is the encryption of 1 G , the simulator S simulates a function index based on the distribution F i * perfectly.
At last, the simulator S outputs what the distinguisher D outputs. Since S perfectly simulates

Remark 2.
In this section, we can see that the leakage ratio of the DDH-based CLR-LTF is only 1 n , where the lossiness is n−logp. This relationship implies that the higher the leakage rate, the lower the lossiness. Therefore, it is hard to improve the leakage rate in the prime order group. In the next part, we would like to present an instantiation in the composite order group, which would provide some help in improving the leakage rate to 1 − o(1).

Continuous Leakage Resilient LTFs from the DCR Assumption
In this section, we show how to construct CLR-LTF under the decisional composite residuosity (DCR) assumption. The group Z * N α+1 is a multiplicative group where α ≥ 1 is an integer. In addition, the integer N = PQ is an RSA modulus, which means that P and Q are odd primes of equivalent bit length. Obviously, the group Z * N α+1 is a direct product G × H, where G is a cyclic group of order N α and H is isomorphic to Z * N . We define T := 1 + N(modN α+1 ); therefore, T generates the group H. In addition, the discrete logarithm with respect to T over group H is efficiently computable. Such an N will be called admissible in the following discussion.

The Scheme
for some negligible = (κ). The construction CLR-TDF=(G, S, F, F −1 , U) is operated over the group Z * N α+1 as follows.

2.
S(pp, b): Given b ∈ {0, 1}, choose r ∈ Z * N and define When b = 1, we say it is in injective mode; otherwise, we say it is in lossy mode. At last, the evaluation key is ek = (R, Q) ∈ G l × Z * N α+1 . 3.
F(ek, x): Given a message x ∈ Z N α . Given a function index (R, Q), then calculate F R,Q (x) = (c 1 , c 2 ), where F −1 (td, c): Firstly, parse c as (c 1 , c 2 ). In the injective mode, we compute X = c 2 · (c −s 1 ) = T x . At last, output the message x = log T X.

5.
U(td, uk): Given the update key uk = w and the trapdoor is updated into the new one td = td + β = s + β, where β ← kernel(w).

Correctness
• Since the updated trapdoor is td = s + β, we have h = g w,s+β = g w,s = h.

•
For any evaluation key ek, there exist since in injective mode (i.e., b = 1), T bx = T x holds and the correctness of F and F −1 follows.

Theorem 2.
If the DDH assumption is hard in G and the DCR problem is hard in Z * N α+1 , then we can construct a collection of λ-CLR-TDFs. During each time interval, the proposed scheme can tolerate at most λ ≤ (l − 2)(logN − 3) − 2log(1/ ) bits on the trapdoor, where = (κ) is some negligible function with the security parameter κ. Therefore, the leakage rate is λ |td| = . In addition, the lossiness is at least αlogN − (logN − 2) bits.
Proof. Firstly, we prove the lossiness of the proposed scheme is still αlogN − (logN − 2) bits even after any trapdoor update.

Lemma 6.
Under the assumption that the DDH assumption is hard in G and the DCR problem is hard in Z * N α+1 , if the extended rank hiding assumption holds, then the scheme implies a λ-CLR-CPA secure PKE scheme as long as the leakage parameter λ ≤ (l − 2)(logN − 3) − 2log(1/ ), where = (κ) is some negligible function about κ.
Proof. Obviously, we can extract a DCR-Based ElGamal-like PKE scheme against continuous leakage from the proposed scheme where we can replace the variant b with a message m. As a result, the evaluation key (R, Q) is just the ciphertext of the message m. It is clear that the DCR assumption is properly embedded into the ElGamal-like PKE scheme. Therefore, with the assumption of the DDH and DCR assumptions holding in group G and in Z * N α+1 , respectively, and with the extended rank hiding assumption, the result scheme is a CLR-CPA secure PKE scheme with the leakage parameter λ ≤ (l − 2)(logN − 3) − 2log(1/ ). According to this lemma, it is natural to reduce the following lemma about the indistinguishability of the injective and lossy function.

Lemma 7 (Indistinguishability).
Under the assumption that the DDH assumption is hard in G and the DCR problem is hard in Z * N α+1 , if the extended rank hiding assumption holds, then the injective and lossy functions are still computationally indistinguishable from the continuous leakage as long as the leakage number of the trapdoor is less than λ bits, where λ ≤ (l − 2)(logN − 3) − 2log(1/ ), and where = (κ) is some negligible function about κ.

Conclusions
In this paper, we focus on the lossy trapdoor functions in the presence of continuous leakage. Firstly, we introduce the new notion of updatable lossy trapdoor functions and give the formal definition and security requirements. Meanwhile, we extend the notion of ULTFs to CLR-LTFs and give the explicit security model of CLR-LTFs. Then, we introduce the security properties of the CLR ElGamal-like PKE scheme, which will be embedded into our proposed scheme. Under the standard DDH assumption and DCR assumption, respectively, we introduce two concrete lossy trapdoor functions against continuous leakage in the standard model. In these schemes, the trapdoor can be refreshed at regular intervals and the adversaries can learn unbounded leakage information on the trapdoor along the whole system life. Even though, the proposed CLR-LTFs can also be indistinguishable between the injective and lossy evaluation keys. On the other hand, we also show the performance of the proposed schemes compared with the known existing CLR-LTFs. In form, our proposed scheme can also be seen as a deterministic public key encryption, and we think it is of independent interest in the study of efficient deterministic PKE against continuous leakage.