On the Information-Theoretic Security of Combinatorial All-or-Nothing Transforms

被引:0
|
作者
Gu, Yujie [1 ,2 ]
Akao, Sonata [1 ,2 ]
Esfahani, Navid Nasr [3 ]
Miao, Ying [4 ]
Sakurai, Kouichi [1 ,2 ]
机构
[1] Kyushu Univ, Grad Sch, Fukuoka 8190395, Japan
[2] Kyushu Univ, Fac Informat Sci & Elect Engn, Fukuoka 8190395, Japan
[3] Univ Waterloo, David R Cheriton Sch Comp Sci, Waterloo, ON N2L 3G1, Canada
[4] Univ Tsukuba, Fac Engn Informat & Syst, Tsukuba, Ibaraki 3058573, Japan
基金
日本学术振兴会;
关键词
All-or-nothing transform (AONT); unconditionally secure AONT; combinatorial AONT; perfect security; weak security; conditional entropy; MAXIMUM NUMBER; ENCRYPTION; MATRICES;
D O I
10.1109/TIT.2022.3174008
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
AU-or-nothing transforms (AONTs) were proposed by Rivest as a message preprocessing technique for encrypting data to protect against brute-force attacks, and have numerous applications in cryptography and information security. Later the unconditionally secure AONTs and their combinatorial characterization were introduced by Stinson. Informally, a combinatorial AONT is an array with the unbiased requirements and its security properties in general depend on the prior probability distribution on the inputs s-tuples. Recently, it was shown by Esfahani and Stinson that a combinatorial AONT has perfect security provided that all the inputs s-tuples are equiprobable, and has weak security provided that all the inputs s-tuples are with non-zero probability. This paper aims to explore on the gap between perfect security and weak security for combinatorial (t, s, v)-AONTs. Concretely, we consider the typical scenario that all the s inputs take values independently (but not necessarily identically) and quantify the amount of information H(X vertical bar Y) about any t inputs X that is not revealed by any s - t outputs y. In particular, we establish the general lower and upper bounds on (X vertical bar Y) for combinatorial AONTs using information-theoretic techniques, and also show that the derived bounds can be attained in certain cases. Furthermore, the discussions are extended for the security properties of combinatorial asymmetric AONTs.
引用
收藏
页码:6904 / 6914
页数:11
相关论文
共 50 条
  • [31] An information-theoretic analysis on the interactions of variables in combinatorial optimization problems
    Seo, Dong-Il
    Moon, Byung-Ro
    EVOLUTIONARY COMPUTATION, 2007, 15 (02) : 169 - 198
  • [32] An information-theoretic security analysis of quantum string sealing
    Nakanishi, Masaki
    Tani, Sechiro
    Yamashita, Shigeru
    PROCEEDINGS OF THE 6TH WSEAS INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND PRIVACY (ISP '07): ADVANCED TOPICS IN INFORMATION SECURITY AND PRIVACY, 2007, : 30 - +
  • [33] Two Round Information-Theoretic MPC with Malicious Security
    Ananth, Prabhanjan
    Choudhuri, Arka Rai
    Goel, Aarushi
    Jain, Abhishek
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2019, PT II, 2019, 11477 : 532 - 561
  • [34] Information-theoretic security analysis of physical uncloneable functions
    Tuyls, P
    Skoric, B
    Stallinga, S
    Akkermans, AHM
    Ophey, W
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, 2005, 3570 : 141 - 155
  • [35] Quantum Cryptography for Information-Theoretic Security Quantum Cryptography
    Sanders, Barry
    TECHNOLOGICAL INNOVATIONS IN SENSING AND DETECTION OF CHEMICAL, BIOLOGICAL, RADIOLOGICAL, NUCLEAR THREATS AND ECOLOGICAL TERRORISM, 2012, : 335 - 343
  • [36] Information-theoretic Physical Layer Security for Satellite Channels
    Vazquez-Castro, Angeles
    Hayashi, Masahito
    2017 IEEE AEROSPACE CONFERENCE, 2017,
  • [37] Formalization of Information-Theoretic Security for Key Agreement, Revisited
    Shikata, Junji
    2013 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS (ISIT), 2013, : 2720 - 2724
  • [38] Maximum probabilistic all-or-nothing paths
    Goldberg, Noam
    Poss, Michael
    EUROPEAN JOURNAL OF OPERATIONAL RESEARCH, 2020, 283 (01) : 279 - 289
  • [39] Cake cutting for all-or-nothing utility
    Ihara, Takamasa
    Todo, Taiki
    Sakurai, Yuko
    Yokoo, Makoto
    Transactions of the Japanese Society for Artificial Intelligence, 2017, 32 (05):
  • [40] An application of quasigroups in All-Or-Nothing transform
    Marnas, Stelios I.
    Angelis, Lefteris
    Bleris, George L.
    CRYPTOLOGIA, 2007, 31 (02) : 133 - 142