Impossibility Results for Secret Establishment

被引:2
|
作者
Schmidt, Benedikt [1 ]
Schaller, Patrick [1 ]
Basin, David [1 ]
机构
[1] Swiss Fed Inst Technol, Zurich, Switzerland
关键词
DECIDING KNOWLEDGE; SECURITY PROTOCOLS;
D O I
10.1109/CSF.2010.25
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Security protocol design is a creative discipline where the solution space depends on the problem to be solved and the cryptographic operators available. In this paper, we examine the general question of when two agents can create a shared secret. Namely, given an equational theory describing the cryptographic operators available, is there a protocol that allows the agents to establish a shared secret? We examine this question in several settings. First, we provide necessary and sufficient conditions for secret establishment using subterm convergent theories. This directly yields a decision procedure for this problem. As a consequence, we obtain impossibility results for symmetric encryption and signature schemes. Second, we use algebraic methods to prove impossibility results for two important theories that are not subterm convergent: XOR and abelian groups. Finally, we develop a general combination result that enables modular impossibility proofs. For example, the results for symmetric encryption and XOR can be combined to obtain impossibility for the joint theory.
引用
收藏
页码:261 / 273
页数:13
相关论文
共 50 条