Security Formalizations and Their Relationships for Encryption and Key Agreement in Information-Theoretic Cryptography

被引:13
|
作者
Iwamoto, Mitsugu [1 ]
Ohta, Kazuo [1 ]
Shikata, Junji [2 ]
机构
[1] Univ Electrocommun, Grad Sch Informat & Engn, Chofu, Tokyo 1828585, Japan
[2] Yokohama Natl Univ, Grad Sch Environm & Informat Sci, Yokohama, Kanagawa 2408501, Japan
关键词
Information-theoretic security; unconditional security; perfect secrecy; indistinguishability; semantic security; composable security; encryption; key agreement; COMMON RANDOMNESS;
D O I
10.1109/TIT.2017.2744650
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper analyzes the formalizations of information-theoretic security for the fundamental primitives in cryptography: symmetric-key encryption and key agreement. Revisiting the previous results, we can formalize information-theoretic security using different methods, by extending Shannon's perfect secrecy, by information-theoretic analogues of indistinguishability and semantic security, and by the frameworks for composability of protocols. We show the relationships among the security formalizations and obtain the following results. First, in the case of encryption, there are significant gaps among the formalizations, and a certain type of relaxed perfect secrecy or a variant of information-theoretic indistinguishability is the strongest notion. Second, in the case of key agreement, there are significant gaps among the formalizations, and a certain type of relaxed perfect secrecy is the strongest notion. In particular, in both encryption and key agreement, the formalization of composable security is not stronger than any other formalizations. Furthermore, as an application of the relationships in encryption and key agreement, we simultaneously derive a family of lower bounds on the size of secret keys and security quantities required under the above formalizations, which also implies the importance and usefulness of the relationships.
引用
收藏
页码:654 / 685
页数:32
相关论文
共 50 条
  • [1] Formalization of Information-Theoretic Security for Key Agreement, Revisited
    Shikata, Junji
    2013 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS (ISIT), 2013, : 2720 - 2724
  • [2] Quantum Cryptography for Information-Theoretic Security Quantum Cryptography
    Sanders, Barry
    TECHNOLOGICAL INNOVATIONS IN SENSING AND DETECTION OF CHEMICAL, BIOLOGICAL, RADIOLOGICAL, NUCLEAR THREATS AND ECOLOGICAL TERRORISM, 2012, : 335 - 343
  • [3] Quantum public-key encryption protocols with information-theoretic security
    Yang, Li
    Yang, Biyao
    Pan, Jiangyou
    QUANTUM OPTICS II, 2012, 8440
  • [4] From weak to strong information-theoretic key agreement
    Maurer, U
    Wolf, S
    2000 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, PROCEEDINGS, 2000, : 18 - 18
  • [5] Strong security against active attacks in information-theoretic secret-key agreement
    Wolf, S
    ADVANCES IN CRYPTOLOGY - ASIACRYPT'98, 1998, 1514 : 405 - 419
  • [6] An Information-Theoretic Security Evaluation of a Class of Randomized Encryption Schemes
    Oggier, Frederique
    Mihaljevic, Miodrag J.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (02) : 158 - 168
  • [7] On Information-Theoretic Metrics for Symmetric-Key Encryption and Privacy
    Calmon, Flavio P.
    Varia, Mayank
    Medard, Muriel
    2014 52ND ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING (ALLERTON), 2014, : 889 - 894
  • [8] New Bounds on the Information-Theoretic Key Agreement of Multiple Terminals
    Gohari, Amin Aminzadeh
    Anantharam, Venkat
    2008 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS, VOLS 1-6, 2008, : 742 - 746
  • [9] INFORMATION-THEORETIC LIMITS TO QUANTUM CRYPTOGRAPHY
    BARNETT, SM
    PHOENIX, SJD
    PHYSICAL REVIEW A, 1993, 48 (01): : R5 - R8
  • [10] Trends and Development of Information-Theoretic Cryptography
    Shikata, Junji
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2015, E98A (01) : 16 - 25