論文

査読有り
2018年1月1日

Security formalizations and their relationships for encryption and key agreement in information-theoretic cryptography

IEEE Transactions on Information Theory
  • Mitsugu Iwamoto
  • ,
  • Kazuo Ohta
  • ,
  • Junji Shikata

64
1
開始ページ
654
終了ページ
685
記述言語
英語
掲載種別
研究論文(学術雑誌)
DOI
10.1109/TIT.2017.2744650
出版者・発行元
Institute of Electrical and Electronics Engineers Inc.

This paper analyzes the formalizations of information-theoretic security for the fundamental primitives in cryptography: symmetric-key encryption and key agreement. Revisiting the previous results, we can formalize information-theoretic security using different methods, by extending Shannon’s perfect secrecy, by information-theoretic analogues of indistinguishability and semantic security, and by the frameworks for composability of protocols. We show the relationships among the security formalizations and obtain the following results. First, in the case of encryption, there are significant gaps among the formalizations, and a certain type of relaxed perfect secrecy or a variant of information-theoretic indistinguishability is the strongest notion. Second, in the case of key agreement, there are significant gaps among the formalizations, and a certain type of relaxed perfect secrecy is the strongest notion. In particular, in both encryption and key agreement, the formalization of composable security is not stronger than any other formalizations. Furthermore, as an application of the relationships in encryption and key agreement, we simultaneously derive a family of lower bounds on the size of secret keys and security quantities required under the above formalizations, which also implies the importance and usefulness of the relationships.

リンク情報
DOI
https://doi.org/10.1109/TIT.2017.2744650
ID情報
  • DOI : 10.1109/TIT.2017.2744650
  • ISSN : 0018-9448
  • SCOPUS ID : 85028710488

エクスポート
BibTeX RIS