Exploiting randomness on continuous sets

被引:2
|
作者
Li, Shuhai [1 ]
Wang, Yumin [1 ]
机构
[1] Xidian Univ, ISN Natl Key Lab, Xian 710071, Peoples R China
关键词
randomness; cryptography; continuous sets; irrational;
D O I
10.1016/j.ins.2006.07.020
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we introduce a new type of field-continuous sets, where we can exploit randomness in the non-repeating decimal expansions of irrationals for cryptographical purposes, and present two specific sets, a real interval [0, 1) and a functional space F-[0,F- 1). On [0, 1), we propose ideal irrational random number generator (IIRNG) which generates non-repeating random number sequence as a truly RNG by computing the decimal expansion of an randomly chosen irrational. On F-[0,F- 1), we propose integral encryption scheme (IES) with which we can encrypt an infinite message and obtain perfect security in one-time encryption by computing the integration of the message on a randomly chosen function. Either the seeds of IIRNG or the keys of IES are sufficiently safe and immune to exhaustive key search. Both IIRNG and ITS require the assumption that an element of [0, 1) or F-[0,F- 1) can be uniformly randomly chosen. Though the assumption cannot be achieved in classical finite machine, we present the discretization of the assumption, i.e., randomly choosing an element of U or V (the set of all possible methods of generating irrationals or functions). The immunity of seeds or keys to exhaustive key search still exists, since any finite search for a random element of U or V is inefficient. This is the basic idea of implementing IIRNG and IES in finite machine. Two corresponding examples IRNG and IBC are also presented, whose securities are guaranteed by the randomly chosen elements of U or V. (c) 2006 Elsevier Inc. All rights reserved.
引用
收藏
页码:192 / 201
页数:10
相关论文
共 50 条
  • [1] Exploiting Randomness in Stochastic Computing
    Ting, Paishun
    Hayes, John P.
    [J]. 2019 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN (ICCAD), 2019,
  • [2] Exploiting Randomness in Deep Learning Algorithms
    Langroudi, Hamed F.
    Merkel, Cory
    Syed, Humza
    Kudithipudi, Dhireesha
    [J]. 2019 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2019,
  • [3] Exploiting randomness in quantum information processing
    Lee, CF
    Johnson, NF
    [J]. PHYSICS LETTERS A, 2002, 301 (5-6) : 343 - 349
  • [4] Algorithmic randomness of closed sets
    Barmpalias, George
    Brodhead, Paul
    Cenzer, Douglas
    Dashti, Seyyed
    Weber, Rebecca
    [J]. JOURNAL OF LOGIC AND COMPUTATION, 2007, 17 (06) : 1041 - 1062
  • [5] CONTINUOUS MAJORIZATION AND RANDOMNESS
    HICKEY, RJ
    [J]. JOURNAL OF APPLIED PROBABILITY, 1984, 21 (04) : 924 - 929
  • [6] Continuous higher randomness
    Bienvenu, Laurent
    Greenberg, Noam
    Monin, Benoit
    [J]. JOURNAL OF MATHEMATICAL LOGIC, 2017, 17 (01)
  • [7] Exploiting Common Randomness: a Resource for Network Secrecy
    Czap, Laszlo
    Prabhakaran, Vinod M.
    Diggavi, Suhas
    Fragouli, Christina
    [J]. 2013 IEEE INFORMATION THEORY WORKSHOP (ITW), 2013,
  • [8] Higher randomness and forcing with closed sets
    Monin, Benoit
    [J]. 31ST INTERNATIONAL SYMPOSIUM ON THEORETICAL ASPECTS OF COMPUTER SCIENCE (STACS 2014), 2014, 25 : 566 - 577
  • [9] Effectively closed sets of measures and randomness
    Reimann, Jan
    [J]. ANNALS OF PURE AND APPLIED LOGIC, 2008, 156 (01) : 170 - 180
  • [10] Higher Randomness and Forcing with Closed Sets
    Benoit Monin
    [J]. Theory of Computing Systems, 2017, 60 : 421 - 437