Paper 2025/358

The Complexity of Memory Checking with Covert Security

Elette Boyle, Reichman University, NTT Research
Ilan Komargodski, Hebrew University of Jerusalem, NTT Research
Neekon Vafa, Massachusetts Institute of Technology
Abstract

A memory checker is an algorithmic tool used to certify the integrity of a database maintained on a remote, unreliable, computationally bounded server. Concretely, it allows a user to issue instructions to the server and after every instruction, obtain either the correct value or a failure (but not an incorrect answer) with high probability. A recent result due to Boyle, Komargodski, and Vafa (BKV, STOC '24) showed a tradeoff between the size of the local storage and the number of queries the memory checker makes to the server upon every logical instruction. Specifically, they show that every non-trivial memory checker construction with inverse-polynomial soundness and local storage at most $n^{1 - \epsilon}$ must make $\Omega(\log n/ \log \log n)$ queries, and this is tight up to constant factors given known constructions. However, an intriguing question is whether natural relaxations of the security guarantee could allow for more efficient constructions. We consider and adapt the notion of covert security to the memory checking context, wherein the adversary can effectively cheat while taking the risk of being caught with constant probability. Notably, BKV's lower bound does not apply in this setting. We close this gap and prove that $\Omega(\log n/ \log \log n)$ overhead is unavoidable even in the covert security setting. Our lower bound applies to any memory checker construction, including ones that use randomness and adaptivity and ones that rely on cryptographic assumptions and/or the random oracle model, as long as they satisfy a natural "read-only reads" property. This property requires a memory checker not to modify contents of the database or local storage in the execution of a logical read instruction.

Metadata
Available format(s)
PDF
Category
Foundations
Publication info
A minor revision of an IACR publication in EUROCRYPT 2025
Keywords
covert securitymemory checkinglower bound
Contact author(s)
eboyle @ alum mit edu
ilank @ cs huji ac il
nvafa @ mit edu
History
2025-03-04: approved
2025-02-25: received
See all versions
Short URL
https://ia.cr/2025/358
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2025/358,
      author = {Elette Boyle and Ilan Komargodski and Neekon Vafa},
      title = {The Complexity of Memory Checking with Covert Security},
      howpublished = {Cryptology {ePrint} Archive, Paper 2025/358},
      year = {2025},
      url = {https://eprint.iacr.org/2025/358}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.