Cryptographic Security of Individual Instances

被引:0
|
作者
Antunes, L. [1 ]
Laplante, S. [2 ]
Pinto, A. [1 ]
Salvador, L. [1 ]
机构
[1] Univ Porto, Dept Ciencias Computadores, Oporto, Portugal
[2] Univ Paris 11, LRI, Orsay, France
来源
关键词
Perfect secrecy; Kolmogorov complexity;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
There are two principal notions of security for cryptographic systems. For a few systems, they can be proven to have perfect secrecy against an opponent with unlimited computational power, in terms of information theory. However, the security of most systems, including public key cryptosystems, is based on complexity theoretic assumptions. In both cases there is an implicit notion of average-case analysis. In the case of conditional security, the underlying assumption is usually average-case, not worst case hardness. And for unconditional security, entropy itself is an average case notion of encoding length. Kolmogorov complexity (the size of the smallest program that generates a string) is a rigorous measure of the amount of information, or randomness, in an individual string x. By considering the time-bounded Kolmogorov complexity (program limited to run in time t(vertical bar x vertical bar)) we can take into account the computational difficulty of extracting information. We present a new notion of security based on Kolmogorov complexity. The first goal is to provide a formal definition of what it means for an individual instance to be secure. The second goal is to bridge the gap between information theoretic security, and computational security, by using time-bounded Kolmogorov complexity. In this paper, we lay the groundwork of the study of cryptosystems from the point of view of security of individual instances by considering three types of information-theoretically secure cryptographic systems: cipher systems (such as the one-time pad), threshold secret sharing, and authentication schemes.
引用
收藏
页码:195 / +
页数:2
相关论文
共 50 条
  • [31] Security and composition of cryptographic protocols: A tutorial
    Canetti, R., 1600, IOS Press BV (10):
  • [32] Extremal Quantum Correlations and Cryptographic Security
    Franz, T.
    Furrer, F.
    Werner, R. F.
    PHYSICAL REVIEW LETTERS, 2011, 106 (25)
  • [33] Security Amplification for Interactive Cryptographic Primitives
    Dodis, Yevgeniy
    Impagliazzo, Russell
    Jaiswal, Ragesh
    Kabanets, Valentine
    THEORY OF CRYPTOGRAPHY, 6TH THEORY OF CRYPTOGRAPHY CONFERENCE, TCC 2009, 2009, 5444 : 128 - +
  • [34] A SYSTEM FOR DECIDING THE SECURITY OF CRYPTOGRAPHIC PROTOCOLS
    WATANABE, H
    FUJIWARA, T
    KASAMI, T
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 1993, E76A (01) : 96 - 103
  • [35] SOME CRYPTOGRAPHIC ASPECTS OF SECURITY AND COMMUNICATION
    MUELLER, KH
    FREQUENZ, 1981, 35 (02) : 41 - 46
  • [36] DATA-SECURITY - A CRYPTOGRAPHIC APPROACH
    RAINA, AK
    KAK, SC
    PROCEEDINGS OF THE INDIAN ACADEMY OF SCIENCES-ENGINEERING SCIENCES, 1982, 5 (MAR): : 65 - 83
  • [37] Mechanized verification of cryptographic security of cryptographic security protocol implementation in JAVA through model extraction in the computational model
    Li, Zimao
    Meng, Bo
    Wang, Dejun
    Chen, Wei
    Journal of Software Engineering, 2015, 9 (01): : 1 - 32
  • [38] A Security Enhanced Encryption Scheme and Evaluation of Its Cryptographic Security
    Mihaljevic, Miodrag J.
    ENTROPY, 2019, 21 (07)
  • [39] THE REALIZATION OF INDIVIDUAL INSTANCES IN A MULTILINGUAL GENERATION SYSTEM
    EVERAERT, G
    VANSTEENBERGHE, T
    META, 1994, 39 (01) : 194 - 205
  • [40] Cost-Based Sampling of Individual Instances
    Klement, William
    Flach, Peter
    Japkowicz, Nathalie
    Matwin, Stan
    ADVANCES IN ARTIFICIAL INTELLIGENCE, PROCEEDINGS, 2009, 5549 : 86 - +