Incompressible cryptography (Q2170026)

From MaRDI portal
Revision as of 00:38, 2 February 2024 by Import240129110113 (talk | contribs) (Added link to MaRDI item.)
scientific article
Language Label Description Also known as
English
Incompressible cryptography
scientific article

    Statements

    Incompressible cryptography (English)
    0 references
    0 references
    0 references
    0 references
    30 August 2022
    0 references
    Incompressible encryption produces very large ciphertexts hence adversaries may exhaust their available storage to attack the scheme. Even more, if the adversary stores anything much smaller than the ciphertext, the adversary learns absolutely nothing about the message, even if the secret key later leaks. Incompressible signatures can be made arbitrarily large and an adversary cannot produce a signature on any message unless one of the signatures is stored essentially in its entirety. An incompressible encryption scheme is built based on functional encryption. In these last schemes, a function class is considered and from a master secret key, a particular secret key \(\mathtt{seckey}_f\) is getting for each function \(f\) in the class. Given a ciphertext \(c=\mathtt{Enc}(\mathtt{masterpubkey},m)\) corresponding to a message \(m\) a decryption process gets \(f(m) = \mathtt{Dec}(\mathtt{seckey}_m,c)\). It is used a \((k,\varepsilon)\)-strong average min-entropy extractor \(\mathtt{Extract}:(c,R,z_0)\mapsto z_1\), where \(R\) is a very large bit string, \(c\) is a cipher to recover a map, and \(z_0,z_1\) are partial masks for a plaintext. The string \(R\) is included within the ciphertext produced by the incompressible encryption scheme. For an incompressible signature scheme, a conventional secure public key signature scheme may be used. For a message \(m\), a large bit string \(R\) is generated, and the message \(R\|m\) is signed with the conventional scheme to obtain the signature \(\sigma\). The new signature is \(R\|\sigma\). Security proofs are provided in terms of special games Prover-Adversary in the context of incompressible cryptography and some comparisons are done with former schemes. For the entire collection see [Zbl 1493.94001].
    0 references
    bounded space computation
    0 references
    incompressible encryption schemes
    0 references
    incompressible signatures schemes
    0 references

    Identifiers