Privacy amplification secure against active adversaries

被引:0
|
作者
Maurer, U [1 ]
Wolf, S [1 ]
机构
[1] ETH Zurich, Swiss Fed Inst Technol, Dept Comp Sci, CH-8092 Zurich, Switzerland
关键词
privacy amplification; secret-key agreement; unconditional secrecy; authentication codes; information theory; extractors;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Privacy amplification allows two parties Alice and Bob knowing a partially secret string S to extract, by communication over a public channel, a shorter, highly secret string S '. Bennett, Brassard, Crepeau, and Maurer showed that the length of S ' can be almost equal to the conditional Renyi entropy of S given an opponent Eve's knowledge. All previous results on privacy amplification assumed that Eve has access to the public channel but is passive or, equivalently, that messages inserted by Eve can be detected by Alice and Bob. In this paper we consider privacy amplification secure even against active opponents. First it is analyzed under what conditions information-theoretically secure authentication is possible even though the common key is only partially secret. This result is used to prove that privacy amplification can be secure against an active opponent and that the size of S ' can be almost equal to Eve's min-entropy about S minus 2n/3 if S is an n-bit string. Moreover, it is shown that for sufficiently large on privacy amplification is possible when Eve's min-entropy about S exceeds only n/2 rather than 2n/3.
引用
收藏
页码:307 / 321
页数:15
相关论文
共 50 条
  • [1] Privacy-Preserving Multi-Party Bartering Secure Against Active Adversaries
    Wueller, Stefan
    Meyer, Ulrike
    Wetzel, Susanne
    [J]. 2017 15TH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2017, : 205 - 214
  • [2] Privacy-Preserving Two-Party Bartering Secure Against Active Adversaries
    Wueller, Stefan
    Pessin, Wadim
    Meyer, Ulrike
    Wetzel, Susanne
    [J]. 2016 14TH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2016,
  • [3] Universally composable privacy amplification against quantum adversaries
    Renner, R
    König, R
    [J]. THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2005, 3378 : 407 - 425
  • [4] Automatic Proofs of Privacy of Secure Multi-Party Computation Protocols Against Active Adversaries
    Pettai, Martin
    Laud, Peeter
    [J]. 2015 IEEE 28TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM CSF 2015, 2015, : 75 - 89
  • [5] A Quantum-Proof Non-malleable Extractor With Application to Privacy Amplification Against Active Quantum Adversaries
    Aggarwal, Divesh
    Chung, Kai-Min
    Lin, Han-Hsuan
    Vidick, Thomas
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2019, PT II, 2019, 11477 : 442 - 469
  • [6] Privacy amplification secure against an adversary with selectable knowledge
    König, R
    Maurer, U
    Renner, R
    [J]. 2004 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, PROCEEDINGS, 2004, : 231 - 231
  • [7] Duality of privacy amplification against quantum adversaries and data compression with quantum side information
    Renes, Joseph M.
    [J]. PROCEEDINGS OF THE ROYAL SOCIETY A-MATHEMATICAL PHYSICAL AND ENGINEERING SCIENCES, 2011, 467 (2130): : 1604 - 1623
  • [8] Efficient public-key cryptosystems provably secure against active adversaries
    Paillier, P
    Pointcheval, D
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT'99, PROCEEDINGS, 1999, 1716 : 165 - 179
  • [9] Privacy amplification against active attacks with strong robustness
    Liu, SL
    Wang, YM
    [J]. ELECTRONICS LETTERS, 1999, 35 (09) : 712 - 713
  • [10] Encryption Schemes Secure Against Profiling Adversaries
    Diaz-Santiago, Sandra
    Chakraborty, Debrup
    [J]. E-BUSINESS AND TELECOMMUNICATIONS, ICETE 2012, 2014, 455 : 172 - 191