Show simple item record

dc.contributor.author
Fischlin, Marc
dc.contributor.author
Günther, Felix
dc.contributor.author
Muth, Philipp
dc.contributor.editor
Meng, Weizhi
dc.contributor.editor
Gollmann, Dieter
dc.contributor.editor
Jensen, Christian D.
dc.contributor.editor
Zhou, Jianying
dc.date.accessioned
2020-09-07T09:36:03Z
dc.date.available
2020-09-07T06:29:57Z
dc.date.available
2020-09-07T07:41:57Z
dc.date.available
2020-09-07T09:36:03Z
dc.date.issued
2020-08
dc.identifier.isbn
978-3-030-61078-4
en_US
dc.identifier.isbn
978-3-030-61077-7
en_US
dc.identifier.uri
http://hdl.handle.net/20.500.11850/438741
dc.identifier.doi
10.3929/ethz-b-000438741
dc.description.abstract
We discuss the setting of information-theoretically secure channel protocols where confidentiality of transmitted data should hold against unbounded adversaries. We argue that there are two possible scenarios: One is that the adversary is currently bounded, but stores today's communication and tries to break confidentiality later when obtaining more computational power or time. We call channel protocols protecting against such attacks future-secure. The other scenario is that the adversary already has extremely strong computational powers and may try to use that power to break current executions. We call channels withstanding such stronger attacks unconditionally-secure. We discuss how to instantiate both future-secure and unconditionally-secure channels. To this end we first establish according confidentiality and integrity notions, then prove the well-known composition theorem to also hold in the information-theoretic setting: Chosen-plaintext security of the channel protocol, together with ciphertext integrity, implies the stronger chosen-ciphertext notion. We discuss how to build future-secure channel protocols by combining computational message authentication schemes like HMAC with one-time pad encryption. Chosen-ciphertext security follows easily from the generalized composition theorem. We also show that using one-time pad encryption with the unconditionally-secure Carter-Wegman MACs we obtain an unconditionally-secure channel protocol.
en_US
dc.format
application/pdf
en_US
dc.language.iso
en
en_US
dc.publisher
Springer
en_US
dc.rights.uri
http://rightsstatements.org/page/InC-NC/1.0/
dc.title
Information-Theoretic Security of Cryptographic Channels
en_US
dc.type
Conference Paper
dc.rights.license
In Copyright - Non-Commercial Use Permitted
ethz.book.title
Information and Communications Security 22nd International Conference, ICICS 2020, Copenhagen, Denmark, August 24–26, 2020, Proceedings
en_US
ethz.size
17 p. accepted version
en_US
ethz.version.deposit
acceptedVersion
en_US
ethz.event
22nd International Conference on Information and Communications Security (ICICS 2020) (virtual)
en_US
ethz.event.location
Copenhagen, Denmark
en_US
ethz.event.date
August 24–27, 2020
en_US
ethz.notes
Conference lecture held on August 24, 2020. Due to the Corona virus (COVID-19) the conference was conducted virtually.
en_US
ethz.publication.status
published
en_US
ethz.leitzahl
ETH Zürich::00002 - ETH Zürich::00012 - Lehre und Forschung::00007 - Departemente::02150 - Dep. Informatik / Dep. of Computer Science::02660 - Institut für Informationssicherheit / Institute of Information Security::09653 - Paterson, Kenneth / Paterson, Kenneth
en_US
ethz.leitzahl.certified
ETH Zürich::00002 - ETH Zürich::00012 - Lehre und Forschung::00007 - Departemente::02150 - Dep. Informatik / Dep. of Computer Science::02660 - Institut für Informationssicherheit / Institute of Information Security::09653 - Paterson, Kenneth / Paterson, Kenneth
en_US
ethz.date.deposited
2020-09-07T06:30:07Z
ethz.source
FORM
ethz.eth
yes
en_US
ethz.availability
Open access
en_US
ethz.rosetta.installDate
2021-02-15T17:01:47Z
ethz.rosetta.lastUpdated
2022-03-29T03:03:53Z
ethz.rosetta.versionExported
true
ethz.COinS
ctx_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.atitle=Information-Theoretic%20Security%20of%20Cryptographic%20Channels&rft.date=2020-08&rft.au=Fischlin,%20Marc&G%C3%BCnther,%20Felix&Muth,%20Philipp&rft.isbn=978-3-030-61078-4&978-3-030-61077-7&rft.genre=proceeding&rft.btitle=Information%20and%20Communications%20Security%2022nd%20International%20Conference,%20ICICS%202020,%20Copenhagen,%20Denmark,%20August%2024%E2%80%9326,%202020,%20Proceedin
 Search print copy at ETH Library

Files in this item

Thumbnail

Publication type

Show simple item record