Incompressible cryptography (Q2170026): Difference between revisions

From MaRDI portal
Added link to MaRDI item.
ReferenceBot (talk | contribs)
Changed an Item
 
(2 intermediate revisions by 2 users not shown)
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/978-3-031-06944-4_24 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W4285244033 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Public-Key Encryption in the Bounded-Retrieval Model / rank
 
Normal rank
Property / cites work
 
Property / cites work: Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4941847 / rank
 
Normal rank
Property / cites work
 
Property / cites work: On Virtual Grey Box Obfuscation for General Circuits / rank
 
Normal rank
Property / cites work
 
Property / cites work: On Extractability Obfuscation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Candidate iO from homomorphic encryption schemes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4783716 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Functional Signatures and Pseudorandom Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Big-Key Symmetric Encryption: Resisting Key Exfiltration / rank
 
Normal rank
Property / cites work
 
Property / cites work: Lower and Upper Bounds for Deniable Public-Key Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Constrained Pseudorandom Functions and Their Applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Intrusion-Resilient Key Exchange in the Bounded Retrieval Model / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4364544 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4364559 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Theory of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4783724 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Theory of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology - EUROCRYPT 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Theory of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: On Forward-Secure Storage / rank
 
Normal rank
Property / cites work
 
Property / cites work: Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3729902 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Indistinguishability obfuscation from circular security / rank
 
Normal rank
Property / cites work
 
Property / cites work: Functional Encryption with Bounded Collusions via Multi-party Computation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Simple schemes in the bounded storage model / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q5750403 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Indistinguishability obfuscation from well-founded assumptions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4409123 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Conditionally-perfect secrecy and a provably-secure randomized cipher / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology – CRYPTO 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Incompressible encodings / rank
 
Normal rank
Property / cites work
 
Property / cites work: All-or-nothing encryption and the package transform / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology - CRYPTO 2003 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Barriers in cryptography with weak, correlated and leaky sources / rank
 
Normal rank
Property / cites work
 
Property / cites work: Candidate obfuscation via oblivious LWE sampling / rank
 
Normal rank

Latest revision as of 00:02, 30 July 2024

scientific article
Language Label Description Also known as
English
Incompressible cryptography
scientific article

    Statements

    Incompressible cryptography (English)
    0 references
    0 references
    0 references
    0 references
    30 August 2022
    0 references
    Incompressible encryption produces very large ciphertexts hence adversaries may exhaust their available storage to attack the scheme. Even more, if the adversary stores anything much smaller than the ciphertext, the adversary learns absolutely nothing about the message, even if the secret key later leaks. Incompressible signatures can be made arbitrarily large and an adversary cannot produce a signature on any message unless one of the signatures is stored essentially in its entirety. An incompressible encryption scheme is built based on functional encryption. In these last schemes, a function class is considered and from a master secret key, a particular secret key \(\mathtt{seckey}_f\) is getting for each function \(f\) in the class. Given a ciphertext \(c=\mathtt{Enc}(\mathtt{masterpubkey},m)\) corresponding to a message \(m\) a decryption process gets \(f(m) = \mathtt{Dec}(\mathtt{seckey}_m,c)\). It is used a \((k,\varepsilon)\)-strong average min-entropy extractor \(\mathtt{Extract}:(c,R,z_0)\mapsto z_1\), where \(R\) is a very large bit string, \(c\) is a cipher to recover a map, and \(z_0,z_1\) are partial masks for a plaintext. The string \(R\) is included within the ciphertext produced by the incompressible encryption scheme. For an incompressible signature scheme, a conventional secure public key signature scheme may be used. For a message \(m\), a large bit string \(R\) is generated, and the message \(R\|m\) is signed with the conventional scheme to obtain the signature \(\sigma\). The new signature is \(R\|\sigma\). Security proofs are provided in terms of special games Prover-Adversary in the context of incompressible cryptography and some comparisons are done with former schemes. For the entire collection see [Zbl 1493.94001].
    0 references
    bounded space computation
    0 references
    incompressible encryption schemes
    0 references
    incompressible signatures schemes
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references

    Identifiers