Publication | Closed Access
Non-malleable extractors and symmetric key cryptography from weak secrets
151
Citations
16
References
2009
Year
Unknown Venue
Cryptographic PrimitiveEngineeringInformation SecurityCryptographic TechnologyCryptographic ProtocolFormal VerificationHardware SecurityInformation Theoretic SecuritySecure CommunicationSecure ProtocolSymmetric Key CryptographyCryptanalysisWeak SecretsData PrivacyComputer ScienceData SecurityCryptographyEntropyActive Adversary Eve
We study the question of basing symmetric key cryptography on weak secrets. In this setting, Alice and Bob share an n-bit secret W, which might not be uniformly random, but the adversary has at least k bits of uncertainty about it (formalized using conditional min-entropy). Since standard symmetric-key primitives require uniformly random secret keys, we would like to construct an authenticated key agreement protocol in which Alice and Bob use W to agree on a nearly uniform key R, by communicating over a public channel controlled by an active adversary Eve. We study this question in the information theoretic setting where the attacker is computationally unbounded. We show that single-round (i.e. one message) protocols do not work when k ≤ n/2, and require poor parameters even when n/2<k<<n.
| Year | Citations | |
|---|---|---|
1975 | 7K | |
2020 | 5.3K | |
2014 | 3.7K | |
2008 | 1.7K | |
1995 | 1.4K | |
1988 | 869 | |
1996 | 643 | |
2008 | 508 | |
2003 | 157 | |
2003 | 156 |
Page 1
Page 1