Publication | Closed Access
On the (Im)possibility of Cryptography with Imperfect Randomness
108
Citations
33
References
2004
Year
Unknown Venue
Cryptographic PrimitiveEngineeringInformation SecurityVerificationCryptographic TechnologyCryptographic ProtocolImperfect RandomnessFormal VerificationInformation Theoretic SecurityImperfect Entropy SourcesSecure Multi-party ComputationData PrivacyProbability TheoryComputer ScienceEntropy SourcesData SecurityCryptographyEntropyCryptographic ProtectionFormal MethodsBlockchain
We investigate the feasibility of a variety of cryptographic tasks with imperfect randomness. The kind of imperfect randomness we consider are entropy sources, such as those considered by Santha and Vazirani, Chor and Goldreich, and Zuckerman. We show the following: (1) certain cryptographic tasks like bit commitment, encryption, secret sharing, zero-knowledge, non-interactive zero-knowledge, and secure two-party computation for any non-trivial junction are impossible to realize if parties have access to entropy sources with slightly less-than-perfect entropy, i.e., sources with imperfect randomness. These results are unconditional and do not rely on any un-proven assumption. (2) On the other hand, based on stronger variants of standard assumptions, secure signature schemes are possible with imperfect entropy sources. As another positive result, we show (without any unproven assumption) that interactive proofs can be made sound with respect to imperfect entropy sources.
| Year | Citations | |
|---|---|---|
Page 1
Page 1