首页> 外文期刊>IEEE Transactions on Information Theory >How to fool an unbounded adversary with a short key
【24h】

How to fool an unbounded adversary with a short key

机译:如何用短键欺骗无界的对手

获取原文
获取原文并翻译 | 示例
           

摘要

The symmetric encryption problem which manifests itself when two parties must securely transmit a message m with a short shared secret key is considered in conjunction with a computationally unbounded adversary. As the adversary is unbounded, any encryption scheme must leak information about m; in particular, the mutual information between m and its ciphertext cannot be zero. Despite this, a family of encryption schemes is presented that guarantee that for any message space in {0,1}/sup n/ with minimum entropy n-/spl lscr/ and for any Boolean function h:{0,1}/sup n/ /spl rarr/ {0,1}, no adversary can predict h(m) from the ciphertext of m with more than 1/sup /spl omega/(1)/ advantage; this is achieved with keys of length /spl lscr/+/spl omega/(logn). In general, keys of length /spl lscr/+s yield a bound of 2/sup -/spl Theta/(s)/ on the advantage. These encryption schemes rely on no unproven assumptions and can be implemented efficiently. Applications of this to cryptosystems based on complexity-theoretic assumptions are discussed and, in addition, a simplified proof of a fundamental "elision lemma" of Goldwasser and Micali is provided.
机译:对称加密问题是在两方必须使用短共享秘密密钥安全地发送消息m时表现出来的,它与计算上不受限制的对手一起考虑。由于对手是不受限制的,因此任何加密方案都必须泄漏有关m的信息。特别地,m与其密文之间的互信息不能为零。尽管如此,还是提出了一系列加密方案,这些方案可确保对于{0,1} / sup n /中的任何消息空间,具有最小的熵n- / spl lscr /,以及任何布尔函数h:{0,1} / sup n / / spl rarr / {0,1},没有任何对手能够从m的密文中预测h(m)的优势超过1 / n / sup / spl omega /(1)/;这可以通过长度为/ spl lscr / + / spl omega /(logn)的密钥来实现。通常,长度为/ spl lscr / + s的键在优势上产生2 / sup-/ spl Theta /(s)/的边界。这些加密方案不依赖未经证实的假设,并且可以有效实施。讨论了基于复杂性理论假设将其应用于密码系统的方法,此外,还提供了Goldwasser和Micali的基本“选举引理”的简化证明。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号