Shannon Impossibility, Revisited

作者: Yevgeniy Dodis

DOI: 10.1007/978-3-642-32284-6_6

关键词: Scheme (programming language)Theoretical computer scienceBounded functionConditional mutual informationMathematicsKey (cryptography)EncryptionImpossibilityMathematical proofStatement (logic)

摘要: In this note we revisit the famous result of Shannon [Sha49] stating that any encryption scheme with perfect security against computationally unbounded attackers must have a secret key as long message. This motivated introduction modern schemes, which are secure only bounded attacker, and allow some small (negligible) advantage to such an attacker. It is well known folklore both relaxations -- limiting power attacker allowing for necessary overcome Shannon's result. To our surprise, could not find clean documented proof belief. (In fact, two proofs required, each showing one above sufficient.) Most saw either made assumptions (e.g., deterministic), or proved much more complicated statement beating bound implies existence one-way functions [IL89].)

参考文章(10)
Russell Impagliazzo, Michael Luby, One-way Functions are Essential for Complexity Based Cryptography (Extended Abstract) foundations of computer science. pp. 230- 235 ,(1989)
Mihir Bellare, Stefano Tessaro, Alexander Vardy, Semantic Security for the Wiretap Channel international cryptology conference. pp. 294- 311 ,(2012) , 10.1007/978-3-642-32009-5_18
R. Impagliazzo, M. Luby, One-way functions are essential for complexity based cryptography foundations of computer science. pp. 230- 235 ,(1989) , 10.1109/SFCS.1989.63483
Thomas M. Cover, Joy A. Thomas, Elements of information theory ,(1991)
C. E. Shannon, Communication theory of secrecy systems Bell System Technical Journal. ,vol. 28, pp. 656- 715 ,(1949) , 10.1002/J.1538-7305.1949.TB00928.X
Stefan Wolf, Unconditional Security in Cryptography Lecture Notes in Computer Science. pp. 217- 250 ,(1999) , 10.1007/3-540-48969-X_10
Mitsugu Iwamoto, Kazuo Ohta, Security notions for information theoretically secure encryptions international symposium on information theory. pp. 1777- 1781 ,(2011) , 10.1109/ISIT.2011.6033854
Lectures on Data Security Springer Berlin Heidelberg. ,(1999) , 10.1007/3-540-48969-X
Shafi Goldwasser, Silvio Micali, Probabilistic encryption Journal of Computer and System Sciences. ,vol. 28, pp. 270- 299 ,(1984) , 10.1016/0022-0000(84)90070-9