首页> 外文期刊>Journal of Cryptology >Encryption against Storage-Bounded Adversaries from On-Line Strong Extractors
【24h】

Encryption against Storage-Bounded Adversaries from On-Line Strong Extractors

机译:通过在线强提取程序对存储受限的对手进行加密

获取原文
获取原文并翻译 | 示例
           

摘要

We study the problem of information-theoretically secure encryption in the bounded-storage model introduced by Maurer. The sole assumption of this model is a limited storage bound on an eavesdropper Eve, who is even allowed to be computationally unbounded. Suppose a sender Alice and a receiver Bob agreed on a short private key beforehand, and there is a long public random string accessible by all parties, say broadcast from a satellite or sent by Alice. Eve can only store some partial information of this long random string due to her limited storage. Alice and Bob read the public random string using the shared private key, and produce a one-time pad for encryption or decryption. In this setting, Aumann et al. proposed protocols with a nice property called everlasting security, which says that the security holds even if Eve later manages to obtain that private key. Ding and Rabin gave a better analysis showing that the same private key can be securely reused for an exponential number of times, against some adaptive attacks. We show that an encryption scheme with such nice properties can be derived immediately from any strong randomness extractor, a function which extracts randomness from a slightly random source, so that its output and its seed together are almost random. To have an efficient encryption scheme, one needs a strong extractor that can be evaluated in an on-line and efficient way. We give one such construction, which yields an encryption scheme that has the nice security properties as before but now can encrypt longer messages using shorter private keys.
机译:我们在Maurer引入的有界存储模型中研究了信息理论上安全的加密问题。该模型的唯一假设是窃听者Eve的存储空间有限,甚至允许其不受计算限制。假设发送方爱丽丝和接收者鲍勃事先同意使用短私钥,并且各方都能访问一个较长的公共随机字符串,例如从卫星广播或由爱丽丝发送。由于存储空间有限,夏娃只能存储此长随机字符串的部分部分信息。爱丽丝和鲍勃使用共享私钥读取公共随机字符串,并生成用于加密或解密的一次性密码。在这种情况下,Aumann等人。提出的协议具有很好的特性,称为永久安全性,它表示即使Eve后来设法获得该私钥,该安全性仍然有效。 Ding和Rabin进行了更好的分析,表明针对某些自适应攻击,相同的私钥可以安全地重用成倍的次数。我们展示了可以从任何强大的随机性提取器中立即获得具有如此出色属性的加密方案,该函数可从稍微随机的源中提取随机性,因此其输出和种子几乎都是随机的。为了拥有有效的加密方案,人们需要一种强大的提取器,并且可以通过在线高效的方式对其进行评估。我们给出了这样一种构造,它产生了一种加密方案,该方案具有和以前一样好的安全性,但是现在可以使用较短的私钥来加密较长的消息。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号