On the Information-Theoretic Security of Combinatorial All-or-Nothing Transforms

被引:0
|
作者
Gu, Yujie [1 ,2 ]
Akao, Sonata [1 ,2 ]
Esfahani, Navid Nasr [3 ]
Miao, Ying [4 ]
Sakurai, Kouichi [1 ,2 ]
机构
[1] Kyushu Univ, Grad Sch, Fukuoka 8190395, Japan
[2] Kyushu Univ, Fac Informat Sci & Elect Engn, Fukuoka 8190395, Japan
[3] Univ Waterloo, David R Cheriton Sch Comp Sci, Waterloo, ON N2L 3G1, Canada
[4] Univ Tsukuba, Fac Engn Informat & Syst, Tsukuba, Ibaraki 3058573, Japan
基金
日本学术振兴会;
关键词
All-or-nothing transform (AONT); unconditionally secure AONT; combinatorial AONT; perfect security; weak security; conditional entropy; MAXIMUM NUMBER; ENCRYPTION; MATRICES;
D O I
10.1109/TIT.2022.3174008
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
AU-or-nothing transforms (AONTs) were proposed by Rivest as a message preprocessing technique for encrypting data to protect against brute-force attacks, and have numerous applications in cryptography and information security. Later the unconditionally secure AONTs and their combinatorial characterization were introduced by Stinson. Informally, a combinatorial AONT is an array with the unbiased requirements and its security properties in general depend on the prior probability distribution on the inputs s-tuples. Recently, it was shown by Esfahani and Stinson that a combinatorial AONT has perfect security provided that all the inputs s-tuples are equiprobable, and has weak security provided that all the inputs s-tuples are with non-zero probability. This paper aims to explore on the gap between perfect security and weak security for combinatorial (t, s, v)-AONTs. Concretely, we consider the typical scenario that all the s inputs take values independently (but not necessarily identically) and quantify the amount of information H(X vertical bar Y) about any t inputs X that is not revealed by any s - t outputs y. In particular, we establish the general lower and upper bounds on (X vertical bar Y) for combinatorial AONTs using information-theoretic techniques, and also show that the derived bounds can be attained in certain cases. Furthermore, the discussions are extended for the security properties of combinatorial asymmetric AONTs.
引用
收藏
页码:6904 / 6914
页数:11
相关论文
共 50 条
  • [41] All-or-nothing encryption and the package transform
    Rivest, RL
    FAST SOFTWARE ENCRYPTION, 1997, 1267 : 210 - 218
  • [42] All-or-Nothing versus Proportionate Damages
    Leshem, Shmuel
    Miller, Geoffrey P.
    JOURNAL OF LEGAL STUDIES, 2009, 38 (02): : 345 - 382
  • [43] Analysis of all-or-nothing hash functions
    Lin, Pin
    Wu, Wenling
    Wu, Chuankun
    Qiu, Tian
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2008, 24 (05) : 1473 - 1484
  • [44] Triggering the all-or-nothing switch into mitosis
    O'Farrell, PH
    TRENDS IN CELL BIOLOGY, 2001, 11 (12) : 512 - 519
  • [45] Olfactory coding with all-or-nothing glomeruli
    Koulakov, Alexei
    Gelperin, Alan
    Rinberg, Dmitry
    JOURNAL OF NEUROPHYSIOLOGY, 2007, 98 (06) : 3134 - 3142
  • [46] THE ALL-OR-NOTHING MULTICOMMODITY FLOW PROBLEM
    Chekuri, Chandra
    Khanna, Sanjeev
    Shepherd, F. Bruce
    SIAM JOURNAL ON COMPUTING, 2013, 42 (04) : 1467 - 1493
  • [47] HOTSONS SYNDROME - THE ALL-OR-NOTHING RULE
    GERBER, P
    MEDICAL JOURNAL OF AUSTRALIA, 1988, 148 (03) : 138 - 140
  • [48] All-or-Nothing Concurrent Entanglement Routing
    Wei, Ching-Ting
    Zhan, Kai-Xu
    Huang, Po-Wei
    Chang, Wei-Ting
    Kuo, Jian-Jhih
    ICC 2024 - IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2024, : 3634 - 3639
  • [49] All-or-nothing thinking about NLP
    Grimley, Bruce
    PSYCHOLOGIST, 2013, 26 (07) : 472 - 472
  • [50] The All-or-Nothing Syndrome and the Human Condition
    de Pina-Cabral, Joao
    SOCIAL ANALYSIS, 2009, 53 (02): : 163 - 176