On the Security of Pseudorandomized Information-Theoretically Secure Schemes

被引:3
|
作者
Nuida, Koji [1 ]
Hanaoka, Goichiro [1 ]
机构
[1] Natl Inst Adv Ind Sci & Technol, Res Inst Secure Syst, Tsukuba 3058568, Japan
关键词
Information-theoretic security; pseudorandom generator (PRG); randomness reduction; PRIVACY;
D O I
10.1109/TIT.2012.2216978
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we discuss a naive method of randomness reduction for cryptographic schemes, which replaces the required perfect randomness with output distribution of a computationally secure pseudorandom generator (PRG). We propose novel ideas and techniques for evaluating the indistinguishability between the random and pseudorandom cases, even against an adversary with computationally unbounded attack algorithm. Hence, the PRG-based randomness reduction can be effective even for information-theoretically secure cryptographic schemes, especially when the amount of information received by the adversary is small. In comparison to a preceding result of Dubrov and Ishai (STOC 2006), our result removes the requirement of generalized notion of "nb-PRGs" and is effective for more general kinds of protocols. We give some numerical examples to show the effectiveness of our result in practical situations, and we also propose a further idea for improving the effect of the PRG-based randomness reduction.
引用
收藏
页码:635 / 652
页数:18
相关论文
共 50 条
  • [1] On the Security of Pseudorandomized Information-Theoretically Secure Schemes
    Nuida, Koji
    Hanaoka, Goichiro
    [J]. INFORMATION THEORETIC SECURITY, 2010, 5973 : 56 - 73
  • [2] INFORMATION-THEORETICALLY SECURE PROTOCOLS AND SECURITY UNDER COMPOSITION
    Kushilevitz, Eyal
    Lindell, Yehuda
    Rabin, Tal
    [J]. SIAM JOURNAL ON COMPUTING, 2010, 39 (05) : 2090 - 2112
  • [3] Efficient information-theoretically secure schemes for cloud data outsourcing
    Sobati-Moghadam, Somayeh
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2021, 24 (04): : 3591 - 3606
  • [4] Efficient information-theoretically secure schemes for cloud data outsourcing
    Somayeh Sobati-Moghadam
    [J]. Cluster Computing, 2021, 24 : 3591 - 3606
  • [5] Information-theoretically secure keyless authentication
    Korjik, V
    Bakin, M
    [J]. 2000 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, PROCEEDINGS, 2000, : 20 - 20
  • [6] Information-Theoretically Secure Key Generation and Management
    Yang, En-Hui
    Wu, Xin-Wen
    [J]. 2017 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2017, : 1529 - 1533
  • [7] On Optimal Information-Theoretically Secure Key Management
    Yang, En-Hui
    Wu, Xin-Wen
    [J]. 2019 16TH CANADIAN WORKSHOP ON INFORMATION THEORY (CWIT), 2019,
  • [8] Parallel reducibility for information-theoretically secure computation
    Dodis, Y
    Micali, S
    [J]. ADVANCES IN CRYPTOLOGY-CRYPTO 2000, PROCEEDINGS, 2000, 1880 : 74 - 92
  • [9] Security research on an information-theoretically secure secret key agreement using LDPC matrices
    Yu, Jia
    Luo, Yuan
    Li, Minglu
    [J]. PROCEEDINGS OF THE THIRD CHINAGRID ANNUAL CONFERENCE, 2008, : 197 - 201
  • [10] Information-Theoretically Secure Erasure Codes for Distributed Storage
    Rashmi, K. V.
    Shah, Nihar B.
    Ramchandran, Kannan
    Kumar, P. Vijay
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2018, 64 (03) : 1621 - 1646