Format Preserving Encryption in the Bounded Retrieval Model

07/16/2023
by   Ben Morris, et al.
0

In the bounded retrieval model, the adversary can leak a certain amount of information from the message sender's computer (e.g., 10 percent of the hard drive). Bellare, Kane and Rogaway give an efficient symmetric encryption scheme in the bounded retrieval model. Their scheme uses a giant key (a key so large only a fraction of it can be leaked.) One property of their scheme is that the encrypted message is larger than the original message. Rogaway asked if an efficient scheme exists that does not increase the size of the message. In this paper we present such a scheme.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
03/27/2021

Uncloneable Encryption, Revisited

Uncloneable encryption, introduced by Broadbent and Lord (TQC'20), is an...
research
10/13/2021

Covert Message Passing over Public Internet Platforms Using Model-Based Format-Transforming Encryption

We introduce a new type of format-transforming encryption where the form...
research
12/19/2021

Using data compression and randomization to build an unconditionally secure short key cipher

We consider the problem of constructing an unconditionally secure cipher...
research
10/31/2020

A Privacy-Preserving Content-Based Image Retrieval Scheme Allowing Mixed Use Of Encrypted And Plain Images

In this paper, we propose a novel content based-image retrieval scheme a...
research
05/18/2019

Discrete Logarithmic Fuzzy Vault Scheme

In this paper a three fuzzy vault schemes which integrated with discrete...
research
12/31/2020

Lattice-based Signcryption with Equality Test in Standard Model

A signcryption, which is an integration of a public key encryption and a...
research
12/07/2017

One More Way to Encrypt a Message

This work describes an example of an application of a novel method for s...

Please sign up or login with your details

Forgot password? Click here to reset