Security Formalizations and Their Relationships for Encryption and Key Agreement in Information-Theoretic Cryptography

被引:13
|
作者
Iwamoto, Mitsugu [1 ]
Ohta, Kazuo [1 ]
Shikata, Junji [2 ]
机构
[1] Univ Electrocommun, Grad Sch Informat & Engn, Chofu, Tokyo 1828585, Japan
[2] Yokohama Natl Univ, Grad Sch Environm & Informat Sci, Yokohama, Kanagawa 2408501, Japan
关键词
Information-theoretic security; unconditional security; perfect secrecy; indistinguishability; semantic security; composable security; encryption; key agreement; COMMON RANDOMNESS;
D O I
10.1109/TIT.2017.2744650
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper analyzes the formalizations of information-theoretic security for the fundamental primitives in cryptography: symmetric-key encryption and key agreement. Revisiting the previous results, we can formalize information-theoretic security using different methods, by extending Shannon's perfect secrecy, by information-theoretic analogues of indistinguishability and semantic security, and by the frameworks for composability of protocols. We show the relationships among the security formalizations and obtain the following results. First, in the case of encryption, there are significant gaps among the formalizations, and a certain type of relaxed perfect secrecy or a variant of information-theoretic indistinguishability is the strongest notion. Second, in the case of key agreement, there are significant gaps among the formalizations, and a certain type of relaxed perfect secrecy is the strongest notion. In particular, in both encryption and key agreement, the formalization of composable security is not stronger than any other formalizations. Furthermore, as an application of the relationships in encryption and key agreement, we simultaneously derive a family of lower bounds on the size of secret keys and security quantities required under the above formalizations, which also implies the importance and usefulness of the relationships.
引用
收藏
页码:654 / 685
页数:32
相关论文
共 50 条
  • [21] Communication for omniscience by a neutral observer and information-theoretic key agreement of multiple terminals
    Gohari, Amin Aminzadeh
    Anantharam, Venkat
    2007 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS, VOLS 1-7, 2007, : 2056 - 2060
  • [22] Universal Hashing for Information-Theoretic Security
    Tyagi, Himanshu
    Vardy, Alexander
    PROCEEDINGS OF THE IEEE, 2015, 103 (10) : 1781 - 1795
  • [23] Information-Theoretic Analysis of Iris Biometrics for Biometric Cryptography
    Adamovic, Sasa
    Milosavljevic, Milan
    Veinovic, Mladen
    Sarac, Marko
    Jevremovic, Aleksandar
    ACTA POLYTECHNICA HUNGARICA, 2017, 14 (04) : 47 - 62
  • [24] Wireless Information-Theoretic Security in MANETs
    Chrysikos, Theofilos
    Dagiuklas, Tasos
    Kotsopoulos, Stavros
    Dagiuklas, Tasos
    2013 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (IEEE ICC), 2013, : 692 - 696
  • [25] An efficient test for the possibility of information-theoretic key agreement secure against active adversaries
    Wolf, S
    2000 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, PROCEEDINGS, 2000, : 17 - 17
  • [26] MIMO transmissions with information-theoretic secrecy for secret-key agreement in wireless networks
    Li, Xiaohua
    Ratazzi, E. Paul
    MILCOM 2005 - 2005 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-5, 2005, : 1353 - 1359
  • [27] Information-Spectrum Methods for Information-Theoretic Security
    Bloch, Matthieu
    Laneman, J. Nicholas
    2009 INFORMATION THEORY AND APPLICATIONS WORKSHOP, 2009, : 20 - 25
  • [28] Computational and information-theoretic soundness and completeness of formal encryption
    Adao, P
    Bana, G
    Scedrov, A
    18TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2005, : 170 - 184
  • [29] Dynamic Information-Theoretic Measures for Security Informatics
    Colbaugh, Richard
    Glass, Kristin
    Bauer, Travis
    2013 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS: BIG DATA, EMERGENT THREATS, AND DECISION-MAKING IN SECURITY INFORMATICS, 2013, : 45 - 49
  • [30] Mosaics of combinatorial designs for information-theoretic security
    Wiese, Moritz
    Boche, Holger
    DESIGNS CODES AND CRYPTOGRAPHY, 2022, 90 (03) : 593 - 632