【24h】

Cryptographic tamper evidence

机译:密码篡改证据

获取原文

摘要

We propose a new notion of cryptographic tamper evidence. A tamper-evident signature scheme provides an additional procedure Div which detects tampering: given two signatures, Div can determine whether one of them was generated by the forger. Surprisingly, this is possible even after the adversary has inconspicuously learned (exposedootnote We say that a secret is exposed when it becomes known to the adversary. Exposure does not imply that the secrets become publicly known. Moreover, nobody --- except the adversary --- is aware of the exposure taking place.) some --- or even all --- the secrets in the system. In this case, it might be impossible to tell which signature is generated by the legitimate signer and which by the forger, but at least the fact of the tampering will be made evident.We define several variants of tamper-evidence, differing in their power to detect tampering. In all of these, we assume an equally powerful adversary: she adaptively controlsall the inputs to the legitimate signer (i.e., all messages to be signed and their timing), and observes all his outputs; she can also adaptively expose all the secrets at arbitrary times.We provide tamper-evident schemes for all the variants. Some of our schemes use a combinatorial construction of a-separating sets, which might be of independent interest.The schemes are optimal: we prove tight lower-bounds. These lower bounds are perhaps the most surprising result of this paper. The lower bounds proofs are information-theoretic, and thus cannot be broken by introducing number-theoretic or algebraic complexity assumptions.Our mechanisms are purely cryptographic: the tamper-detection algorithm Div is stateless and takes no inputs except the two signatures, it uses no infrastructure (or other ways to conceal additional secrets), and relies on no hardware properties (except those implied by the standard cryptographic assumptions, such as random number generators).All constructions in thispaper are based on arbitrary ordinary signature schemes and do not require random oracles.
机译:我们提出了一种新的密码篡改证据概念。防篡改签名方案提供了一个附加程序Div,用于检测篡改:给定两个签名,Div可以确定其中一个签名是否由伪造者生成。出乎意料的是,即使对手已经学到了不起的知识,这也是可能的(暴露\脚注我们说,当对手知道它的秘密后,我就暴露了这个秘密。此外,没有任何人-除了对手-知道发生了什么。)系统中的一些秘密-甚至全部。在这种情况下,可能无法分辨出哪个签名是由合法签名者生成的,还是由伪造者签名的,但至少可以证明篡改的事实。我们定义了几种篡改证据的变体,它们的功能不同检测篡改。在所有这些情况下,我们都假设一个同样强大的对手:她自适应控制所有对合法签名者的输入(即,所有要签名的消息及其时间安排),以及观察所有的输出;她还可以在任意时间自适应地公开所有秘密。我们为所有变体提供了防篡改方案。我们的一些方案使用a分隔集的组合构造,这可能是独立的利益。这些方案是最优的:我们证明了严格的下界。这些下限也许是本文最令人惊讶的结果。下界证明是信息论的,因此不能通过引入数论或代数复杂性假设来打破。我们的机制是纯密码的:篡改检测算法Div是无状态的,除了两个签名外不接受任何输入,它不使用任何签名。基础架构(或其他隐藏其他机密的方式),并且不依赖任何硬件属性(标准密码假设所隐含的那些属性,例如随机数生成器除外)。本文中的所有构造均基于任意的普通签名方案,并且不需要随机的甲骨文。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号