首页> 外文会议>International conference on information security and cryptology >Bounded-Retrieval Model with Keys Derived from Private Data
【24h】

Bounded-Retrieval Model with Keys Derived from Private Data

机译:具有从私有数据派生的密钥的有界检索模型

获取原文

摘要

The Bounded Retrieval Model (BRM) was proposed at TCC 2006 (independently by Dziembowski and Di Crescenzo et al.). Essentially, the main idea of this model is to design cryptographic schemes with secret keys that are so large that it is infeasible for the adversary to steal them. One of the main technical problems of this idea is that it by definition requires the users to store large amounts of secret data on their disks. In this paper we put forward a technique for dealing with the problem of this large space consumption for protocols in BRM. More precisely, we propose a method to derive keys for such protocols on-the-fly from weakly random private data (like text documents or photos, users keep on their disks anyway for non-cryptographic purposes) in such a way that no extra storage is needed. We prove that any leakage-resilient protocol (belonging to a certain, arguably quite broad class) when run with a key obtained this way retains a similar level of security as the original protocol had. Additionally, we guarantee privacy of the data the actual keys are derived from. In other words: the adversary obtains essentially no information about the private data that is used for the key derivation. Our techniques are based on the disperser graphs. We have also implemented an experimental test of efficiency of our protocol. For arguably practical parameter settings the performance of the dispersing procedure is satisfactory.
机译:有界检索模型(BRM)是在TCC 2006上提出的(由Dziembowski和Di Crescenzo等人独立提出)。本质上,该模型的主要思想是设计具有秘密密钥的密码方案,该密钥太大,以至于对手无法窃取它们。这个想法的主要技术问题之一是,按照定义,它要求用户在其磁盘上存储大量秘密数据。在本文中,我们提出了一种解决BRM协议中如此大的空间消耗问题的技术。更准确地说,我们提出了一种方法,该方法可从微弱的随机私有数据(例如文本文档或照片,用户无论如何出于非加密目的而始终保留在磁盘上)中即时获取此类协议的密钥,而无需额外的存储是必需的。我们证明,使用以这种方式获得的密钥运行时,任何具有防泄漏能力的协议(属于某个类别,可以说是相当广泛的一类)都可以保持与原始协议相似的安全级别。此外,我们保证实际密钥所源自的数据的私密性。换句话说:对手基本上没有获得有关用于密钥派生的私有数据的信息。我们的技术基于分散器图。我们还对协议的效率进行了实验测试。对于可以说的实际参数设置,分散过程的性能令人满意。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号