首页> 外文学位 >Cryptography with imperfect randomness.
【24h】

Cryptography with imperfect randomness.

机译:具有不完美随机性的密码术。

获取原文
获取原文并翻译 | 示例

摘要

Cryptographic protocols, though used in a wide range of everyday tasks, are typically built for certain unrealistic ideal conditions in which the user is assumed to work. For example, one such condition that is implicitly assumed is that the user has perfect randomness that she can use as her cryptographic secret key. Another commonly made assumption is that the user runs her cryptographic tasks (such as encryption) on a device that is perfectly secure; that is, its internals are not tampered with or even observed by an adversary.;In this thesis, we focus on designing cryptographic techniques that are secure under less-than-ideal conditions. In order to remove the assumption that users share perfectly random secret keys, we study the problem of "privacy amplification": key agreement between two parties who both know a weak secret w, such as a password. The goal of the protocol is to convert this non-uniform secret w into a uniformly distributed string R that is fully secret from the adversary. R may then be used as a key for running symmetric cryptographic protocols (such as encryption or authentication). Because we make no computational assumptions, the entropy in R can come only from w. Thus such a protocol must minimize the entropy loss during its execution, so that R is as long as possible. In this thesis, we present the first protocol for information-theoretic key agreement that has entropy loss linear in the security parameter. The result is optimal up to constant factors. We also extend our results to the case where the users share correlated secrets w and w' . This setting occurs, for example, when the secrets are biometric readings taken at different points of time and is more generally known as "information-reconciliation".
机译:尽管密码协议用于各种各样的日常任务,但通常是为假定用户在其中工作的某些不切实际的理想条件而建立的。例如,隐式假定的一种条件是用户具有完全随机性,可以用作她的加密秘密密钥。另一个通常的假设是,用户在完全安全的设备上运行其加密任务(例如加密)。也就是说,它的内部结构不会被对手篡改,甚至不会受到对手的观察。在本文中,我们将重点放在设计在低于理想条件下安全的加密技术上。为了消除用户完全共享随机密钥的假设,我们研究了“隐私放大”问题:两个都知道弱密钥w的各方(例如密码)之间的密钥协议。该协议的目标是将这个非统一的秘密w转换为对对手完全秘密的均匀分布的字符串R。 R然后可以用作运行对称密码协议(例如加密或身份验证)的密钥。由于我们没有任何计算假设,因此R中的熵只能来自w。因此,这样的协议必须在其执行期间使熵损失最小化,以使R尽可能长。在本文中,我们提出了第一个信息理论密钥协商协议,该协议在安全参数中具有线性熵损失。在恒定因素下,结果是最佳的。我们还将结果扩展到用户共享相关秘密w和w'的情况。例如,当机密是在不同时间点获取的生物特征读数时,就会发生此设置,并且这种设置通常被称为“信息和解”。

著录项

  • 作者单位

    Boston University.;

  • 授予单位 Boston University.;
  • 学科 Computer Science.
  • 学位 Ph.D.
  • 年度 2011
  • 页码 50 p.
  • 总页数 50
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号