On Generating the Initial Key in the Bounded-Storage Model

نویسندگان

  • Stefan Dziembowski
  • Ueli Maurer
چکیده

In the bounded-storage model (BSM) for information-theoretically secure encryption and key-agreement one uses a random string R whose length t is greater than the assumed bound s on the adversary Eve’s storage capacity. The legitimate parties Alice and Bob share a short initial secret key K which they use to select and combine certain bits of R to obtain a derived key X which is much longer than K. Eve can be proved to obtain essentially no information about X even if she has infinite computing power and even if she learns K after having performed the storage operation and lost access to R. This paper addresses the problem of generating the initial key K and makes two contributions. First, we prove that without such a key, secret key agreement in the BSM is impossible unless Alice and Bob have themselves very high storage capacity, thus proving the optimality of a scheme proposed by Cachin and Maurer. Second, we investigate the hybrid model where K is generated by a computationally secure key agreement protocol. The motivation for the hybrid model is to achieve provable security under the sole assumption that Eve cannot break the key agreement scheme during the storage phase, even if afterwards she may gain infinite computing power (or at least be able to break the key agreement scheme). In earlier work on the BSM, it was suggested that such a hybrid scheme is secure because if Eve has no information about K during the storage phase, then she has missed any opportunity to know anything about X, even when later learning K. We show that this very intuitive and apparently correct reasoning is false by giving an example of a secure (according to the standard definition) computational key-agreement scheme for which the BSM-scheme is nevertheless completely insecure. One of the surprising consequences of this example is that existing definitions for the computational security of key-agreement and encryption are still too weak and therefore new, stronger definitions

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Particles Size Distribution Effect on 3d Packing of Nanoparticles Into a Bounded Region

In this paper, the effects of two different Particle Size Distributions (PSD) on packingbehavior of ideal rigid spherical nanoparticles using a novel packing model based on parallelalgorithms have been reported. A mersenne twister algorithm was used to generate pseudorandomnumbers for the particles initial coordinates. Also, for this purpose a nanosized tetragonal confinedcontainer with a squar...

متن کامل

Operation Planning of Wind Farms with Pumped Storage Plants Based on Interval Type-2 Fuzzy Modeling of Uncertainties

The operation planning problem encounters several uncertainties in terms of the power system’s parameters such as load, operating reserve and wind power generation. The modeling of those uncertainties is an important issue in power system operation. The system operators can implement different approaches to manage these uncertainties such as stochastic and fuzzy methods. In this paper, new ...

متن کامل

A Dissipative Integral Sliding Mode Control Redesign Method

This paper develops a new method of integral sliding mode control redesign for a class of perturbed nonlinear dissipative switched systems by modifying the dissipativity-based control law that was designed for the unperturbed systems. The nominal model is considered affine with matched and unmatched perturbations. The redesigned control law includes an integral sliding-based control signal such...

متن کامل

A New Conceptual Model for Quantitative Fire Risk Assessment of Oil Storage Tanks in the Tehran Refinery, Iran

The purpose of this research was to introduce and describe a model for Fire Quantitative Risk Assessment of in petroleum Storage Tanks. A novel model was designed to determine the risk of a fire occurrence using of Loss Causation and Swiss cheese models. Then, based on FTA, model and its integration with our initial proposed model, the final model was obtained for fire hazard determination in h...

متن کامل

Risk premiums and certainty equivalents of loss-averse newsvendors of bounded utility

Loss-averse behavior makes the newsvendors avoid the losses more than seeking the probable gains as the losses have more psychological impact on the newsvendor than the gains. In economics and decision theory, the classical newsvendor models treat losses and gains equally likely, by disregarding the expected utility when the newsvendor is loss-averse. Moreover, the use of unbounded utility to m...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004