首页> 外文会议>Theory of Cryptography >Basing Weak Public-Key Cryptography on Strong One-Way Functions
【24h】

Basing Weak Public-Key Cryptography on Strong One-Way Functions

机译:弱公钥密码学基于强大的单向功能

获取原文
获取原文并翻译 | 示例

摘要

In one of the pioneering papers on public-key cryptography, Ralph Merkle suggested a heuristic protocol for exchanging a secret key over an insecure channel by using an idealized private-key encryption scheme. Merkle's protocol is presumed to remain secure as long as the gap between the running time of the adversary and that of the honest parties is at most quadratic (rather than super-polynomial). In this work, we initiate an effort to base similar forms of public-key cryptography on well-founded assumptions. We suggest a variant of Merkle's protocol whose security can be based on the one-wayness of the underlying primitive. Specifically, using a one-way function of exponential strength, we obtain a key agreement protocol resisting adversaries whose running time is nearly quadratic in the running time of the honest parties. This protocol gives the adversary a small (but non-negligible) advantage in guessing the key. We show that the security of the protocol can be amplified by using a one-way function with a strong form of a hard-core predicate, whose existence follows from a conjectured "dream version" of Yao's XOR lemma. On the other hand, we show that this type of hard-core predicate cannot be based on (even exponentially strong) one-wayness by using a black-box construction. In establishing the above results, we reveal interesting connections between the problem under consideration and problems from other domains. In particular, we suggest a paradigm for converting (unconditionally) secure protocols in Maurer's bounded storage model into (computationally) secure protocols in the random oracle model, translating storage advantage into computational advantage. Our main protocol can be viewed as an instance of this paradigm. Finally, we observe that a quantum adversary can completely break the security of our protocol (as well as Merkle's heuristic protocol) by using the quadratic speedup of Graver's quantum search algorithm. This raises a speculation that there might be a closer relation between (classical) public-key cryptography and quantum computing than is commonly believed.
机译:在有关公钥密码学的开创性论文之一中,拉尔夫·默克尔(Ralph Merkle)提出了一种启发式协议,该协议通过使用理想化的私钥加密方案在不安全的信道上交换私钥。只要对手的运行时间与诚实方的运行时间之间的差距最多是二次(而不是超多项式),默克尔的协议就可以保持安全。在这项工作中,我们将努力以有根据的假设为基础,建立类似形式的公钥密码学。我们建议使用Merkle协议的一种变体,该协议的安全性可以基于基础原语的单向性。具体而言,使用指数强度的单向函数,我们获得了一个关键协议协议,该协议可抵抗诚实方的运行时间几乎是二次运行时间的对手。该协议使对手在猜测密钥时具有很小(但不可忽略)的优势。我们表明,可以通过使用具有强形式的硬核谓词的单向函数来放大协议的安全性,该函数的存在源自姚明XOR引理的一个推测性“梦想版本”。另一方面,通过使用黑盒结构,我们证明了这种类型的硬性谓词不能基于(甚至指数强)单向性。在建立上述结果时,我们揭示了所考虑的问题与其他领域的问题之间的有趣联系。特别是,我们建议一种将Maurer的有界存储模型中的(无条件)安全协议转换为随机oracle模型中的(计算)安全协议的范式,从而将存储优势转化为计算优势。我们的主要协议可以看作是这种范例的一个实例。最后,我们观察到,通过使用Graver量子搜索算法的二次加速,量子对手可以完全破坏我们协议(以及Merkle启发式协议)的安全性。这就引起了一种推测,即(经典)公钥密码术和量子计算之间可能比人们普遍认为的关系更紧密。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号