您的瀏覽器不支援JavaScript語法,網站的部份功能在JavaScript沒有啟用的狀態下無法正常使用。

Institute of Information Science, Academia Sinica

Events

Print

Press Ctrl+P to print from browser

Seminar

:::

Protecting against Strong Chosen Distribution Attacks in Public-Key Cryptography

  • LecturerProf. David Xiao (CNRS researcher in the Algorithms and Complexity Group at LIAFA)
    Host: Kai-Min Chung
  • Time2013-11-22 (Fri.) 14:00 ~ 16:00
  • LocationAuditorium 106 at new IIS Building
Abstract

When modeling the security game for public-key encryption, we require an adversary to distinguish between encryptions of different messages, called the challenge ciphertexts.  A scheme is secure if no efficient adversary can distinguish the challenge ciphertexts with non-negligible advantage.  Since in a public-key scheme the adversary may compute encryptions on his own, it is imperative for security that the encryption is randomized.  Traditionally, we assume that the challenge ciphertexts are encrypted using perfect (i.e. completely uniform) randomness.

Since randomness is a scarce resource and since physical sources are imperfect and may even be subject to attacks, more recent models have studied what happens when we relax this assumption.  Namely, what if the challenge ciphertexts are encrypted using imperfect randomness, and perhaps even randomness that is tampered with maliciously by the adversary?

We propose a new security model that roughly captures the following attack model: an attacker plants a virus on the target system, and this virus is able to tamper with the randomness used when generating challenge ciphertexts.

In order to achieve positive results, we restrict the amount of information the virus has about the public key and/or the messages to encrypt.  Nevertheless, we obtain a model that subsumes all previous models studying encryption with weak randomness.  Furthermore, building on results of Raghunathan et al. we propose constructions in both the standard model and the random oracle model that achieve our notion of security.