Papers
Topics
Authors
Recent
Search
2000 character limit reached

On the Semantic Security in the General Bounded Storage Model: A New Proof

Published 27 Mar 2024 in cs.IT and math.IT | (2403.18935v1)

Abstract: In the bounded storage model introduced by Maurer, the adversary is computationally unbounded and has a bounded storage capacity. In this model, information-theoretic secrecy is guaranteed by using a publicly available random string whose length is larger than the adversary storage capacity. The protocol proposed by Maurer is simple, from the perspective of implementation, and efficient, from the perspective of the initial secret key size and random string length. However, he provided the proof of the security for the case where the adversary can access a constant fraction of the random string and store only original bits of the random string. In this paper, we provide a new proof of the security of the protocol proposed by Maurer for the general bounded storage model, i.e., the adversary can access all bits of the random string, and store the output of any Boolean function on the string. We reaffirm that the protocol is absolutely semantically secure in the general bounded storage model.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (10)
  1. G. S. Vernam, “Cipher printing telegraph systems for secret wire and radio telegraphic communications,” J. Amer. Inst. Elec. Eng., vol. 55, no. 2, pp. 109–115, Feb. 1926.
  2. C. E. Shannon, “Communication theory of secrecy systems,” Bell Syst. Tech. J., vol. 28, no. 4, pp. 656–715, Oct. 1949.
  3. Y. Dodis, “Shannon impossibility revisited,” in Proc. Int. Conf. on Inf. Theoretic Security, Montreal, QC, Canada, Aug.15–17, 2012, pp. 100–110.
  4. U. M. Maurer, “Conditionally-perfect secrecy and a provably-secure randomized cipher,” J. of Cryptol., vol. 5, no. 1, pp. 53–66, Jan. 1992.
  5. C. Cachin and U. Maurer, “Unconditional security against memory-bounded adversaries,” in Proc. Int. Cryptology Conf., Santa Barbara, California, USA, Aug. 17–21, 1997, pp. 292–306.
  6. A. Yonatan and M. O. Rabin, “Information theoretically secure communication in the limited storage space mode,” in Proc. Int. Cryptology Conf., Santa Barbara, California, USA, Aug. 15–19, 1999, pp. 65–79.
  7. Y. Aumann, Y. Z. Ding, and M. O. Rabin, “Everlasting security in the bounded storage model,” IEEE Trans. Inform. Theory, vol. 48, no. 6, pp. 1668–1680, Jun. 2002.
  8. Y. Z. Ding and M. O. Rabin, “Hyper-encryption and everlasting security,” in Proc. Symp. Theoretical Asp. of Computer Sci. Antibes, Juan les Pins, France, Mar. 14–16, 2002, pp. 1–26.
  9. S. Dziembowski and U. Maurer, “Tight security proofs for the bounded-storage model,” in Proc. ACM Symp. on Theory of Computing, Quebec, Canada, May 19–21, 2002, pp. 341–350.
  10. S. Goldwasser and S. Micali, “Probabilistic encryption,” J. Comput. Syst. Sci., vol. 28, no. 2, pp. 270––299, Apr. 1984.

Summary

No one has generated a summary of this paper yet.

Paper to Video (Beta)

No one has generated a video about this paper yet.

Whiteboard

No one has generated a whiteboard explanation for this paper yet.

Open Problems

We haven't generated a list of open problems mentioned in this paper yet.

Continue Learning

We haven't generated follow-up questions for this paper yet.

Collections

Sign up for free to add this paper to one or more collections.

Tweets

Sign up for free to view the 1 tweet with 0 likes about this paper.