Volume 3876 of the series Lecture Notes in Computer Science pp 601-616
Separating Sources for Encryption and Secret Sharing
- Yevgeniy DodisAffiliated withDepartment of Computer Science, New York University
- , Krzysztof PietrzakAffiliated withDepartment of Computer Science, ETH Zurich
- , Bartosz PrzydatekAffiliated withDepartment of Computer Science, ETH Zurich
Abstract
Most cryptographic primitives such as encryption, authentication or secret sharing require randomness. Usually one assumes that perfect randomness is available, but those primitives might also be realized under weaker assumptions. In this work we continue the study of building secure cryptographic primitives from imperfect random sources initiated by Dodis and Spencer (FOCS’02). Their main result shows that there exists a (high-entropy) source of randomness allowing for perfect encryption of a bit, and yet from which one cannot extract even a single weakly random bit, separating encryption from extraction. Our main result separates encryption from 2-out-2 secret sharing (both in the information-theoretic and in the computational settings): any source which can be used to achieve one-bit encryption also can be used for 2-out-2 secret sharing of one bit, but the converse is false, even for high-entropy sources. Therefore, possibility of extraction strictly implies encryption, which in turn strictly implies 2-out-2 secret sharing.
- Title
- Separating Sources for Encryption and Secret Sharing
- Book Title
- Theory of Cryptography
- Book Subtitle
- Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006. Proceedings
- Pages
- pp 601-616
- Copyright
- 2006
- DOI
- 10.1007/11681878_31
- Print ISBN
- 978-3-540-32731-8
- Online ISBN
- 978-3-540-32732-5
- Series Title
- Lecture Notes in Computer Science
- Series Volume
- 3876
- Series ISSN
- 0302-9743
- Publisher
- Springer Berlin Heidelberg
- Copyright Holder
- Springer-Verlag Berlin Heidelberg
- Additional Links
- Topics
- Industry Sectors
- eBook Packages
- Editors
-
- Shai Halevi (16)
- Tal Rabin (17)
- Editor Affiliations
-
- 16. IBM Research
- 17. IBM T.J.Watson Research Center
- Authors
-
- Yevgeniy Dodis (18)
- Krzysztof Pietrzak (19)
- Bartosz Przydatek (19)
- Author Affiliations
-
- 18. Department of Computer Science, New York University, New York, NY, USA
- 19. Department of Computer Science, ETH Zurich, 8092, Zurich, Switzerland
Continue reading...
To view the rest of this content please follow the download PDF link above.