Abstract
A fundamental problem in cryptography is that of secure communication over an insecure channel, where a sender Alice wishes to communicate with a receiver Bob, in the presence of a powerful Adversary \( \mathcal{A}\mathcal{D} \). The primary goal of encryption is to protect the privacy of the conversation between Alice and Bob against \( \mathcal{A}\mathcal{D} \) . Modern cryptographic research has identified additional essentially important criteria for a secure encryption scheme. Namely that the encryption be non-malleable, be resistant to various chosen plaintext and ciphertext attacks, and if so desired, will allow the receiver to authenticate the received message and its sender. All these issues are now settled for the case that the Adversary \( \mathcal{A}\mathcal{D} \) is computationally unbounded.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Yonatan Aumann, Yan Zong Ding, and Michael O. Rabin. Everlasting security in the bounded storage model. IEEE Transactions on Information Theory, 48(6):1668–1680, June 2002.
Yonatan Aumann and Michael O. Rabin. Information theoretically secure communication in the limited storage space model. In Advances in Cryptology—CRYPTO’ 99, Lecture Notes in Computer Science, pages 65–79. Springer-Verlag, 1999, 15–19 August 1999.
Christian Cachin and Ueli Maurer. Unconditional security against memory-bounded adversaries. In Burton S. Kaliski Jr., editor, Advances in Cryptology — CRYPTO’ 97, volume 1294 of Lecture Notes in Computer Science, pages 292–306. Springer-Verlag, 1997.
Yan Zong Ding and Michael O. Rabin. Hyper-encryption and everlasting security (extended abstract). In STACS 2002 — 19th Annual Symposium on Theoretical Aspects of Computer Science, Lecture Notes in Computer Science, pages 1–26. Springer-Verlag, 14–16 March 2002.
Stefan Dziembowski and Ueli Maurer. Tight security proofs for the bounded-storage model. In Proceedings of the Thirty-Fourth Annual ACM Symposium on Theory of Computing, pages 341–350, Montreal, 19–21 May 2002.
Chi-Jen Lu. Hyper-encryption against space-bounded adversaries from online strong extractors. In Advances in Cryptology—CRYPTO’ 02, Lecture Notes in Computer Science. Springer-Verlag, 2002, 18–22 August 2002. To appear.
Ueli Maurer. Conditionally-perfect secrecy and a provably-secure randomized cipher. Journal of Cryptology, 5(1):53–66, 1992.
Salil P. Vadhan. On constructing locally computable extractors and cryptosystems in the bounded storage model. Cryptology ePrint Archive, Report 2002/162, 2002. http://eprint.iacr.org/.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Rabin, M.O. (2003). Hyper Encryption and Everlasting Secrets. In: Petreschi, R., Persiano, G., Silvestri, R. (eds) Algorithms and Complexity. CIAC 2003. Lecture Notes in Computer Science, vol 2653. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44849-7_7
Download citation
DOI: https://doi.org/10.1007/3-540-44849-7_7
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-40176-6
Online ISBN: 978-3-540-44849-5
eBook Packages: Springer Book Archive