Cryptographic Security of Individual Instances

被引:0
|
作者
Antunes, L. [1 ]
Laplante, S. [2 ]
Pinto, A. [1 ]
Salvador, L. [1 ]
机构
[1] Univ Porto, Dept Ciencias Computadores, Oporto, Portugal
[2] Univ Paris 11, LRI, Orsay, France
来源
关键词
Perfect secrecy; Kolmogorov complexity;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
There are two principal notions of security for cryptographic systems. For a few systems, they can be proven to have perfect secrecy against an opponent with unlimited computational power, in terms of information theory. However, the security of most systems, including public key cryptosystems, is based on complexity theoretic assumptions. In both cases there is an implicit notion of average-case analysis. In the case of conditional security, the underlying assumption is usually average-case, not worst case hardness. And for unconditional security, entropy itself is an average case notion of encoding length. Kolmogorov complexity (the size of the smallest program that generates a string) is a rigorous measure of the amount of information, or randomness, in an individual string x. By considering the time-bounded Kolmogorov complexity (program limited to run in time t(vertical bar x vertical bar)) we can take into account the computational difficulty of extracting information. We present a new notion of security based on Kolmogorov complexity. The first goal is to provide a formal definition of what it means for an individual instance to be secure. The second goal is to bridge the gap between information theoretic security, and computational security, by using time-bounded Kolmogorov complexity. In this paper, we lay the groundwork of the study of cryptosystems from the point of view of security of individual instances by considering three types of information-theoretically secure cryptographic systems: cipher systems (such as the one-time pad), threshold secret sharing, and authentication schemes.
引用
收藏
页码:195 / +
页数:2
相关论文
共 50 条
  • [1] On the compressibility of NP instances and cryptographic applications
    Harnik, Danny
    Naor, Moni
    47TH ANNUAL IEEE SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 2006, : 719 - +
  • [2] ON THE COMPRESSIBILITY OF NP INSTANCES AND CRYPTOGRAPHIC APPLICATIONS
    Harnik, Danny
    Naor, Moni
    SIAM JOURNAL ON COMPUTING, 2010, 39 (05) : 1667 - 1713
  • [3] The Security of Cryptographic Hashes
    Teat, Chad
    Peltsverger, Svetlana
    PROCEEDINGS OF THE 49TH ANNUAL ASSOCIATION FOR COMPUTING MACHINERY SOUTHEAST CONFERENCE (ACMSE '11), 2011, : 103 - 108
  • [4] Explaining classifications for individual instances
    Robnik-Sikonja, Marko
    Kononenko, Igor
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2008, 20 (05) : 589 - 600
  • [5] Searching for hard instances of CVP problem-cryptographic perspective
    Pardyak, Jacek
    PHOTONICS APPLICATIONS IN ASTRONOMY, COMMUNICATIONS, INDUSTRY, AND HIGH-ENERGY PHYSICS EXPERIMENTS 2007, PTS 1 AND 2, 2007, 6937
  • [6] On the Security Loss in Cryptographic Reductions
    Lu, Chi-Jen
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2009, 2009, 5479 : 72 - 87
  • [7] Hiding Cliques for Cryptographic Security
    Ari Juels
    Marcus Peinado
    Designs, Codes and Cryptography, 2000, 20 : 269 - 280
  • [8] Security and cryptographic hardware implementations
    Sklavos, N
    Proceedings of the 46th IEEE International Midwest Symposium on Circuits & Systems, Vols 1-3, 2003, : 768 - 769
  • [9] CRYPTOGRAPHIC TECHNIQUES AND NETWORK SECURITY
    AYOUB, F
    SINGH, K
    IEE PROCEEDINGS-F RADAR AND SIGNAL PROCESSING, 1984, 131 (07) : 684 - 694
  • [10] Hiding cliques for cryptographic security
    Juels, A
    Peinado, M
    DESIGNS CODES AND CRYPTOGRAPHY, 2000, 20 (03) : 269 - 280