On the Information-Theoretic Security of Combinatorial All-or-Nothing Transforms

被引:0
|
作者
Gu, Yujie [1 ,2 ]
Akao, Sonata [1 ,2 ]
Esfahani, Navid Nasr [3 ]
Miao, Ying [4 ]
Sakurai, Kouichi [1 ,2 ]
机构
[1] Kyushu Univ, Grad Sch, Fukuoka 8190395, Japan
[2] Kyushu Univ, Fac Informat Sci & Elect Engn, Fukuoka 8190395, Japan
[3] Univ Waterloo, David R Cheriton Sch Comp Sci, Waterloo, ON N2L 3G1, Canada
[4] Univ Tsukuba, Fac Engn Informat & Syst, Tsukuba, Ibaraki 3058573, Japan
基金
日本学术振兴会;
关键词
All-or-nothing transform (AONT); unconditionally secure AONT; combinatorial AONT; perfect security; weak security; conditional entropy; MAXIMUM NUMBER; ENCRYPTION; MATRICES;
D O I
10.1109/TIT.2022.3174008
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
AU-or-nothing transforms (AONTs) were proposed by Rivest as a message preprocessing technique for encrypting data to protect against brute-force attacks, and have numerous applications in cryptography and information security. Later the unconditionally secure AONTs and their combinatorial characterization were introduced by Stinson. Informally, a combinatorial AONT is an array with the unbiased requirements and its security properties in general depend on the prior probability distribution on the inputs s-tuples. Recently, it was shown by Esfahani and Stinson that a combinatorial AONT has perfect security provided that all the inputs s-tuples are equiprobable, and has weak security provided that all the inputs s-tuples are with non-zero probability. This paper aims to explore on the gap between perfect security and weak security for combinatorial (t, s, v)-AONTs. Concretely, we consider the typical scenario that all the s inputs take values independently (but not necessarily identically) and quantify the amount of information H(X vertical bar Y) about any t inputs X that is not revealed by any s - t outputs y. In particular, we establish the general lower and upper bounds on (X vertical bar Y) for combinatorial AONTs using information-theoretic techniques, and also show that the derived bounds can be attained in certain cases. Furthermore, the discussions are extended for the security properties of combinatorial asymmetric AONTs.
引用
收藏
页码:6904 / 6914
页数:11
相关论文
共 50 条
  • [21] All-or-Nothing Monitoring
    Zhao, Rui R.
    AMERICAN ECONOMIC REVIEW, 2008, 98 (04): : 1619 - 1628
  • [22] Using All-or-Nothing Encryption to Enhance the Security of Searchable Encryption
    Ma, Wenqi
    Wu, Qingbo
    Tan, Yusong
    Wang, Chunguang
    Wu, Quanyuan
    Hu, Huaping
    2013 IEEE 16TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE 2013), 2013, : 104 - 108
  • [23] Information-Spectrum Methods for Information-Theoretic Security
    Bloch, Matthieu
    Laneman, J. Nicholas
    2009 INFORMATION THEORY AND APPLICATIONS WORKSHOP, 2009, : 20 - 25
  • [24] Dynamic Information-Theoretic Measures for Security Informatics
    Colbaugh, Richard
    Glass, Kristin
    Bauer, Travis
    2013 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS: BIG DATA, EMERGENT THREATS, AND DECISION-MAKING IN SECURITY INFORMATICS, 2013, : 45 - 49
  • [25] Information-theoretic security without an honest majority
    Broadbent, Anne
    Tapp, Alain
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2007, 2007, 4833 : 410 - 426
  • [26] Information-Theoretic Security in Stochastic Control Systems
    Venkitasubramaniam, Parv
    Yao, Jiyun
    Pradhan, Parth
    PROCEEDINGS OF THE IEEE, 2015, 103 (10) : 1914 - 1931
  • [27] ALL-OR-NOTHING DISCLOSURE OF SECRETS
    BRASSARD, G
    CREPEAU, C
    ROBERT, JM
    LECTURE NOTES IN COMPUTER SCIENCE, 1987, 263 : 234 - 238
  • [28] Recalcitrance is not an all-or-nothing situation
    Berjak, P.
    Pammenter, N. W.
    SEED SCIENCE RESEARCH, 1994, 4 (02) : 263 - 264
  • [29] All-or-Nothing Monitoring: Comment
    Chen, Bo
    AMERICAN ECONOMIC REVIEW, 2010, 100 (01): : 625 - 627
  • [30] The security of all-or-nothing encryption: Protecting against exhaustive key search
    Desai, A
    ADVANCES IN CRYPTOLOGY-CRYPTO 2000, PROCEEDINGS, 2000, 1880 : 359 - 375