Fine-Grained Cryptography

نویسندگان

  • Akshay Degwekar
  • Vinod Vaikuntanathan
  • Prashant Nalini Vasudevan
چکیده

Fine-grained cryptographic primitives are ones that are secure against adversaries with an apriori bounded polynomial amount of resources (time, space or parallel-time), where the honest algorithms use less resources than the adversaries they are designed to fool. Such primitives were previously studied in the context of time-bounded adversaries (Merkle, CACM 1978), space-bounded adversaries (Cachin and Maurer, CRYPTO 1997) and parallel-time-bounded adversaries (H̊astad, IPL 1987). Our goal is come up with fine-grained primitives (in the setting of parallel-time-bounded adversaries) and to show unconditional security of these constructions when possible, or base security on widely believed separation of worst-case complexity classes. We show: 1. NC-cryptography: Under the assumption that NC 6= ⊕L/poly, we construct one-way functions, pseudo-random generators (with sub-linear stretch), collision-resistant hash functions and most importantly, public-key encryption schemes, all computable in NC and secure against all NC circuits. Our results rely heavily on the notion of randomized encodings pioneered by Applebaum, Ishai and Kushilevitz, and crucially, make non-blackbox use of randomized encodings for logspace classes. 2. AC-cryptography: We construct (unconditionally secure) pseudo-random generators with arbitrary polynomial stretch, weak pseudo-random functions, secret-key encryption and perhaps most interestingly, collision-resistant hash functions, computable in AC and secure against all AC circuits. Previously, one-way permutations and pseudo-random generators (with linear stretch) computable in AC and secure against AC circuits were known from the works of H̊astad and Braverman. ∗MIT. E-mail: {akshayd,vinodv,prashvas}@mit.edu. Research supported in part by NSF Grants CNS-1350619 and CNS-1414119, Alfred P. Sloan Research Fellowship, Microsoft Faculty Fellowship, the NEC Corporation, a Steven and Renee Finn Career Development Chair from MIT. This work was also sponsored in part by the Defense Advanced Research Projects Agency (DARPA) and the U.S. Army Research Office under contracts W911NF-15-C-0226.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Secure Architecture for Access Control with Hashing Technique in Public Cloud

Traditional approaches are inefficient to support finegrained encryption. Under such approaches, data owner is responsible for encrypting the data before uploading them into cloud and re-encrypting the data whenever there is a change in user’s sub access control policy. Data owners thus incur high communication and computation costs. In order to minimize the overhead at the data owner, fine-gra...

متن کامل

Achieving Fine-grained Access Control and Integrity Auditing in Cloud Storage ⋆

Attributes based encryption (ABE) can achieve flexible and scalable access control and gurantee the confidentiality of the data stored in the cloud. However, important issues such as efficient user revocation and fine-grained access control are not straightforward, which constrain the adoption of ABE in cloud storage systems.Our proposed scheme realizes fine-grained read and write access contro...

متن کامل

Identity-Based Mediated RSA

Identity-based encryption (IBE) [5] and digital signatures are important tools in modern secure communication. In general, identity-based cryptographic methods facilitate easy introduction of public key cryptography by allowing an entity’s public key to be derived from some arbitrary identification value such as an email address or a phone number. Identity-based cryptography greatly reduces the...

متن کامل

The Effect of Geopolymerization on the Unconfined Compressive Strength of Stabilized Fine-grained Soils

This study focuses on evaluating the unconfined compressive strength (UCS) of improved fine-grained soils. A large database of unconfined compressive strength of clayey soil specimens stabilized with fly ash and blast furnace slag based geopolymer were collected and analyzed. Subsequently, using adaptive neuro fuzzy inference system (ANFIS), a model has been developed to assess the UCS of stabi...

متن کامل

Reconfigurable Systems for Cryptography and Multimedia Applications

The area of reconfigurable computing has received considerable interest in both its forms: fine-grained (represented in FPGA) and coarse-grained architectures. Both architecture styles attempt to combine two of the important traits of General Purpose Processors (GPPs) and Application-Specific Integrated Circuits (ASICs): flexibility and speed (Hartenstein, 2001). It provides performance close t...

متن کامل

Privacy Preserving Energy Management

The improvement of energy efficiency is an important target on all levels of society. It is best achieved on the basis of locally and temporally fine-grained measurement data for identifying unnecessary use of energy. However, at the same time such fine-grained measurements allow deriving information about the persons using the energy. In this paper we describe our work towards a privacy preser...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2016  شماره 

صفحات  -

تاریخ انتشار 2016