On the Semantic Security in the General Bounded Storage Model: A New Proof (2403.18935v1)
Abstract: In the bounded storage model introduced by Maurer, the adversary is computationally unbounded and has a bounded storage capacity. In this model, information-theoretic secrecy is guaranteed by using a publicly available random string whose length is larger than the adversary storage capacity. The protocol proposed by Maurer is simple, from the perspective of implementation, and efficient, from the perspective of the initial secret key size and random string length. However, he provided the proof of the security for the case where the adversary can access a constant fraction of the random string and store only original bits of the random string. In this paper, we provide a new proof of the security of the protocol proposed by Maurer for the general bounded storage model, i.e., the adversary can access all bits of the random string, and store the output of any Boolean function on the string. We reaffirm that the protocol is absolutely semantically secure in the general bounded storage model.
- G. S. Vernam, “Cipher printing telegraph systems for secret wire and radio telegraphic communications,” J. Amer. Inst. Elec. Eng., vol. 55, no. 2, pp. 109–115, Feb. 1926.
- C. E. Shannon, “Communication theory of secrecy systems,” Bell Syst. Tech. J., vol. 28, no. 4, pp. 656–715, Oct. 1949.
- Y. Dodis, “Shannon impossibility revisited,” in Proc. Int. Conf. on Inf. Theoretic Security, Montreal, QC, Canada, Aug.15–17, 2012, pp. 100–110.
- U. M. Maurer, “Conditionally-perfect secrecy and a provably-secure randomized cipher,” J. of Cryptol., vol. 5, no. 1, pp. 53–66, Jan. 1992.
- C. Cachin and U. Maurer, “Unconditional security against memory-bounded adversaries,” in Proc. Int. Cryptology Conf., Santa Barbara, California, USA, Aug. 17–21, 1997, pp. 292–306.
- A. Yonatan and M. O. Rabin, “Information theoretically secure communication in the limited storage space mode,” in Proc. Int. Cryptology Conf., Santa Barbara, California, USA, Aug. 15–19, 1999, pp. 65–79.
- Y. Aumann, Y. Z. Ding, and M. O. Rabin, “Everlasting security in the bounded storage model,” IEEE Trans. Inform. Theory, vol. 48, no. 6, pp. 1668–1680, Jun. 2002.
- Y. Z. Ding and M. O. Rabin, “Hyper-encryption and everlasting security,” in Proc. Symp. Theoretical Asp. of Computer Sci. Antibes, Juan les Pins, France, Mar. 14–16, 2002, pp. 1–26.
- S. Dziembowski and U. Maurer, “Tight security proofs for the bounded-storage model,” in Proc. ACM Symp. on Theory of Computing, Quebec, Canada, May 19–21, 2002, pp. 341–350.
- S. Goldwasser and S. Micali, “Probabilistic encryption,” J. Comput. Syst. Sci., vol. 28, no. 2, pp. 270––299, Apr. 1984.