Skip to main content

Hyper Encryption and Everlasting Secrets

A Survey

  • Conference paper
  • First Online:
Algorithms and Complexity (CIAC 2003)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2653))

Included in the following conference series:

Abstract

A fundamental problem in cryptography is that of secure communication over an insecure channel, where a sender Alice wishes to communicate with a receiver Bob, in the presence of a powerful Adversary \( \mathcal{A}\mathcal{D} \). The primary goal of encryption is to protect the privacy of the conversation between Alice and Bob against \( \mathcal{A}\mathcal{D} \) . Modern cryptographic research has identified additional essentially important criteria for a secure encryption scheme. Namely that the encryption be non-malleable, be resistant to various chosen plaintext and ciphertext attacks, and if so desired, will allow the receiver to authenticate the received message and its sender. All these issues are now settled for the case that the Adversary \( \mathcal{A}\mathcal{D} \) is computationally unbounded.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Yonatan Aumann, Yan Zong Ding, and Michael O. Rabin. Everlasting security in the bounded storage model. IEEE Transactions on Information Theory, 48(6):1668–1680, June 2002.

    Article  MATH  MathSciNet  Google Scholar 

  2. Yonatan Aumann and Michael O. Rabin. Information theoretically secure communication in the limited storage space model. In Advances in Cryptology—CRYPTO’ 99, Lecture Notes in Computer Science, pages 65–79. Springer-Verlag, 1999, 15–19 August 1999.

    Chapter  Google Scholar 

  3. Christian Cachin and Ueli Maurer. Unconditional security against memory-bounded adversaries. In Burton S. Kaliski Jr., editor, Advances in Cryptology — CRYPTO’ 97, volume 1294 of Lecture Notes in Computer Science, pages 292–306. Springer-Verlag, 1997.

    Chapter  Google Scholar 

  4. Yan Zong Ding and Michael O. Rabin. Hyper-encryption and everlasting security (extended abstract). In STACS 2002 — 19th Annual Symposium on Theoretical Aspects of Computer Science, Lecture Notes in Computer Science, pages 1–26. Springer-Verlag, 14–16 March 2002.

    Google Scholar 

  5. Stefan Dziembowski and Ueli Maurer. Tight security proofs for the bounded-storage model. In Proceedings of the Thirty-Fourth Annual ACM Symposium on Theory of Computing, pages 341–350, Montreal, 19–21 May 2002.

    Google Scholar 

  6. Chi-Jen Lu. Hyper-encryption against space-bounded adversaries from online strong extractors. In Advances in Cryptology—CRYPTO’ 02, Lecture Notes in Computer Science. Springer-Verlag, 2002, 18–22 August 2002. To appear.

    Google Scholar 

  7. Ueli Maurer. Conditionally-perfect secrecy and a provably-secure randomized cipher. Journal of Cryptology, 5(1):53–66, 1992.

    Article  MATH  MathSciNet  Google Scholar 

  8. Salil P. Vadhan. On constructing locally computable extractors and cryptosystems in the bounded storage model. Cryptology ePrint Archive, Report 2002/162, 2002. http://eprint.iacr.org/.

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Rabin, M.O. (2003). Hyper Encryption and Everlasting Secrets. In: Petreschi, R., Persiano, G., Silvestri, R. (eds) Algorithms and Complexity. CIAC 2003. Lecture Notes in Computer Science, vol 2653. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44849-7_7

Download citation

  • DOI: https://doi.org/10.1007/3-540-44849-7_7

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-40176-6

  • Online ISBN: 978-3-540-44849-5

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics