The Edited Truth
نویسندگان
چکیده
We introduce two new cryptographic notions in the realm of public and symmetric key encryption. • Encryption with invisible edits is an encryption scheme with two tiers of users: “privileged” and “unprivileged”. Privileged users know a key pair (pk, sk) and “unprivileged” users know a key pair (pke, ske) which is associated with an underlying edit e to be applied to messages encrypted. Each key pair on its own works exactly as in standard public-key encryption, but when an unprivileged user attempts to decrypt a ciphertext generated by a privileged user of an underlying plaintext m, it will be decrypted to an edited m0 = Edit(m, e). Here, Edit is some supported edit function and e is a description of the particular edit to be applied. For example, we might want the edit to overwrite several sensitive blocks of data, replace all occurrences of one word with a di↵erent word, airbrush an encrypted image, etc. A user shouldn’t be able to tell whether he’s an unprivileged or a privileged user. • An encryption with deniable edits is an encryption scheme which allows a user who owns a ciphertext c encrypting a large corpus of data m under a secret key sk, to generate an alternative but legitimate looking secret key skc,e that decrypts c to an “edited” version of the data m0 = Edit(m, e). This generalizes classical receiver deniable encryption, which can be viewed as a special case of deniable edits where the edit function performs a complete replacement of the original data. The new flexibility allows us to design solutions with much smaller key sizes than required in classical receiver deniable encryption, and in particular allows the key size to only scale with the description size of the edit e which can be much smaller than the size of the plaintext data m. We construct encryption schemes with deniable and invisible edits for any polynomial-time computable edit function under minimal assumptions: in the public-key setting we only require the existence of standard public-key encryption and in the symmetric-key setting we only require the existence of oneway functions. The solutions to both problems use common ideas, however there is a significant conceptual di↵erence between deniable edits and invisible edits. Whereas encryption with deniable edits enables a user to modify the meaning of a single ciphertext in hindsight, the goal of encryption with invisible edits is to enable ongoing modifications of multiple ciphertexts. ⇤MIT, EECS and Weizmann Institute, Department of Computer Science and Applied Mathematics. [email protected]. Research supported by NSF MACS CNS-1413920 ,DARPA IBM W911NF-15-C-0236, SIMONS Investigator award Agreement Dated 6-5-12 †MIT, EECS. [email protected]. Research supported by an Akamai Presidential Fellowship and NSF MACS CNS1413920 ,DARPA IBM W911NF-15-C-0236, SIMONS Investigator award Agreement Dated 6-5-12 ‡Northeastern University, Department of Computer Science. [email protected]. Research supported by NSF grants CNS1314722, CNS-1413964. 0
منابع مشابه
مبانی منطقی طراحی سیستم خطمشیگذاری دولتی برای تحقق عدالت حقمدار (براساس نهجالبلاغه)
This article demonstrates a part of findings of a research that has been designed with the intention of determining the characteristics of the desired public policy making system for achieving social justice. To begin with, James P. Sterba's categorization of alternative political perspectives to justice is reviewed and then "truth – oriented" justice is studied. To reach a precise and scholar...
متن کاملطراحیو تبیینسیستم خط مشیگذاری حقمدار برای تحقق عدالت اجتماعی (بر اساس نهجالبلاغه)
This article demonstrates a part of findings of a research that has been developed for designing a public policy making system, based on conception of Alavian truth-oriented justice. According to the first part of this research, a logical system is developed. The system introduces five logical principles and nineteen theorems. These principles and theorems are inferred from Nahjolballagha and...
متن کاملHarley and Friday Harbor: A Conversation with John Pickles
During the Association of American Geographers meeting of 2014, we interviewed John Pickles to document his memories of J.B. Harley (1932–1991) and the time period of the early to mid-1990s when the subfield of GIS and Society took form, including the November 1993 meetings at Friday Harbor and the publication of the edited collection Ground Truth (Pickles 1995). What follows is a jointly edite...
متن کاملTowards the ground truth: Exact algorithms for bioinformatics research (NII Shonan Meeting 2014-2)
This report is joint work of the attendees of the seminar (see Section 4) and has been edited by the organizers.
متن کاملReview of “Twitter and Jihad: The Communication Strategy of ISIS” edited by Monica Maggioni and Paolo Magri
Twitter and Jihad: The Communication Strategy of ISIS edited by Monica Maggioni & Paolo Magri. Milan, Italy: ISPI, 2015. 168pp., $10 (p/b), ISBN 978-88-98014-66-8
متن کاملThis Is My (Post) Truth, Tell Me Yours; Comment on “The Rise of Post-truth Populism in Pluralist Liberal Democracies: Challenges for Health Policy”
This is a commentary on the article ‘The rise of post-truth populism in pluralist liberal democracies: challenges for health policy.’ It critically examines two of its key concepts: populism and ‘post truth.’ This commentary argues that there are different types of populism, with unclear links to impacts, and that in some ways, ‘post-truth’ has resonances with arguments advanced in the period a...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2017 شماره
صفحات -
تاریخ انتشار 2017