On the Information-Theoretic Security of Combinatorial All-or-Nothing Transforms

被引:0
|
作者
Gu, Yujie [1 ,2 ]
Akao, Sonata [1 ,2 ]
Esfahani, Navid Nasr [3 ]
Miao, Ying [4 ]
Sakurai, Kouichi [1 ,2 ]
机构
[1] Kyushu Univ, Grad Sch, Fukuoka 8190395, Japan
[2] Kyushu Univ, Fac Informat Sci & Elect Engn, Fukuoka 8190395, Japan
[3] Univ Waterloo, David R Cheriton Sch Comp Sci, Waterloo, ON N2L 3G1, Canada
[4] Univ Tsukuba, Fac Engn Informat & Syst, Tsukuba, Ibaraki 3058573, Japan
基金
日本学术振兴会;
关键词
All-or-nothing transform (AONT); unconditionally secure AONT; combinatorial AONT; perfect security; weak security; conditional entropy; MAXIMUM NUMBER; ENCRYPTION; MATRICES;
D O I
10.1109/TIT.2022.3174008
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
AU-or-nothing transforms (AONTs) were proposed by Rivest as a message preprocessing technique for encrypting data to protect against brute-force attacks, and have numerous applications in cryptography and information security. Later the unconditionally secure AONTs and their combinatorial characterization were introduced by Stinson. Informally, a combinatorial AONT is an array with the unbiased requirements and its security properties in general depend on the prior probability distribution on the inputs s-tuples. Recently, it was shown by Esfahani and Stinson that a combinatorial AONT has perfect security provided that all the inputs s-tuples are equiprobable, and has weak security provided that all the inputs s-tuples are with non-zero probability. This paper aims to explore on the gap between perfect security and weak security for combinatorial (t, s, v)-AONTs. Concretely, we consider the typical scenario that all the s inputs take values independently (but not necessarily identically) and quantify the amount of information H(X vertical bar Y) about any t inputs X that is not revealed by any s - t outputs y. In particular, we establish the general lower and upper bounds on (X vertical bar Y) for combinatorial AONTs using information-theoretic techniques, and also show that the derived bounds can be attained in certain cases. Furthermore, the discussions are extended for the security properties of combinatorial asymmetric AONTs.
引用
收藏
页码:6904 / 6914
页数:11
相关论文
共 50 条
  • [1] On security properties of all-or-nothing transforms
    Esfahani, Navid Nasr
    Stinson, Douglas R.
    DESIGNS CODES AND CRYPTOGRAPHY, 2021, 89 (12) : 2857 - 2867
  • [2] On security properties of all-or-nothing transforms
    Navid Nasr Esfahani
    Douglas R. Stinson
    Designs, Codes and Cryptography, 2021, 89 : 2857 - 2867
  • [3] Mosaics of combinatorial designs for information-theoretic security
    Wiese, Moritz
    Boche, Holger
    DESIGNS CODES AND CRYPTOGRAPHY, 2022, 90 (03) : 593 - 632
  • [4] Mosaics of combinatorial designs for information-theoretic security
    Moritz Wiese
    Holger Boche
    Designs, Codes and Cryptography, 2022, 90 : 593 - 632
  • [5] On unconditionally secure all-or-nothing transforms
    Chang, ZL
    Wen, QY
    ICCC2004: PROCEEDINGS OF THE 16TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION VOL 1AND 2, 2004, : 529 - 534
  • [6] A new mode of using all-or-nothing transforms
    Canda, V
    van Rung, T
    ISIT: 2002 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, PROCEEDINGS, 2002, : 296 - 296
  • [7] ALL-OR-NOTHING INFORMATION CONTROL
    LEWIS, TR
    SAPPINGTON, DEM
    ECONOMICS LETTERS, 1991, 37 (02) : 111 - 113
  • [8] On the security of cryptosystems with all-or-nothing transform
    Zhang, R
    Hanaoka, G
    Imai, H
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2004, 3089 : 76 - 90
  • [9] Exposure-resilient functions and all-or-nothing transforms
    Canetti, R
    Dodis, Y
    Halevi, S
    Kushilevitz, E
    Sahai, A
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2000, 2000, 1807 : 453 - 469
  • [10] Wireless information-theoretic security
    Bloch, Matthieu
    Barros, Joao
    Rodrigues, Miguel R. D.
    McLaughlin, Steven W.
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (06) : 2515 - 2534