Applications of Combinatorics to Information-Theoretic Cryptography
نویسنده
چکیده
3 4 CONTENTS Preface Cryptology, as the scientific study of secure communications, began in World War II. Ever since the foundational work by Shannon [50], and especially after the introduction of public key cryptography in the seventies [21, 46], applications to cryptology have appeared from an increasing number of areas in mathematics. Combinatorics is one of them. For instance, the difficulty of determining the existence of Hamiltonian cycles in a graph has been used to design zero-knowledge proofs, but the most remarkable applications of combinatorics to cryptology appear in the so-called information-theoretic cryptography. The best known and most widely used cryptographic algorithms and protocols for encryption, digital signatures, or authentication base their security on the difficulty of some computational problems. This is the case for both public key cryptography and symmetric cryptography. Nevertheless, several cryptographic protocols are based on the fact that the information hold by the adversaries does not enable them to violate the security requirements. One-time pad encryption and authentication codes [51] are important examples. Secret sharing, which was independently introduced in 1979 by Shamir [49] and Blak-ley [6], is one of the most widely studied topics in information-theoretic cryptography. In a secret sharing scheme, a secret value is distributed into shares among a set of participants is such a way that only some qualified coalitions of participants can recover the secret value from their shares. One can think immediately on possible applications of secret sharing. The first one, proposed by the pioneering authors [6, 49], was safe storage of cryptographic keys. Nevertheless, a number of much less obvious applications of secret sharing to different kinds of cryptographic protocols have appeared. Arguably, the most interesting one is secure multiparty Similarly to other topis in cryptography, research in secret sharing has attracted a lot of attention. Shortly after its introduction, difficult open problems appeared, and the attempts to solve them have involved several areas of mathematics. We focus here mainly on the ones involving matroid theory. Unfortunately, no textbook on secret sharing has appeared yet, but two excellent surveys [1, 54] are available. The reader is referred to [20, 56] for basic textbooks on cryptography. The textbooks on matroid theory by Oxley [44] and by Welsh [57] may be useful too. 5 6 CONTENTS
منابع مشابه
Some results on the complement of a new graph associated to a commutative ring
The rings considered in this article are commutative with identity which are not fields. Let R be a ring. A. Alilou, J. Amjadi and Sheikholeslami introduced and investigated a graph whose vertex set is the set of all nontrivial ideals of R and distinct vertices I, J are joined by an edge in this graph if and only if either ann(I)J = (0) or ann(J)I = (0). They called this graph as a new graph as...
متن کاملPrivate Information Retrieval: A Primer
Private Information Retrieval (PIR) protocols allow a client to retrieve a data item from a database while hiding the identity of the item being retrieved. In information-theoretic k-server PIR protocols the database is replicated among k servers, and each server learns absolutely nothing about the item the client retrieves. In computational PIR protocols the database is stored on one server, a...
متن کاملLecture Notes in Secret Sharing
Preface These are basically the lecture notes for the short course Applications of Combinatorics to 2012. With the objective of covering a full course on secret sharing, additional content will be added in subsequent versions of these lecture notes. Secret sharing, which was independently introduced in 1979 by Shamir [49] and Blak-ley [6], is one of the most widely studied topics in information...
متن کاملEasing Coppersmith Methods Using Analytic Combinatorics: Applications to Public-Key Cryptography with Weak Pseudorandomness
The Coppersmith methods is a family of lattice-based techniques to find small integer roots of polynomial equations. They have found numerous applications in cryptanalysis and, in recent developments, we have seen applications where the number of unknowns and the number of equations are non-constant. In these cases, the combinatorial analysis required to settle the complexity and the success co...
متن کاملOn the design and security of a lattice-based threshold secret sharing scheme
In this paper, we introduce a method of threshold secret sharing scheme (TSSS) in which secret reconstruction is based on Babai's nearest plane algorithm. In order to supply secure public channels for transmitting shares to parties, we need to ensure that there are no quantum threats to these channels. A solution to this problem can be utilization of lattice-based cryptosystems for these channe...
متن کامل