Information-theoretic Key Encapsulation and its Application to Secure Communication

02/03/2021
by   Setareh Sharifian, et al.
0

A hybrid encryption scheme is a public key encryption system that consists of a public-key part called the key encapsulation mechanism (KEM), and a (symmetric) secret-key part called data encapsulation mechanism (DEM): the public-key part is used to generate a shared secret key between the two parties, and the symmetric key part is used to encrypt the message. Hybrid encryption schemes are widely used for secure communication over the Internet. In this paper, we initiate the study of hybrid encryption in preprocessing model which assumes access to initial correlated variables by all the parties (including the eavesdropper). We define information theoretic KEM (iKEM) that together with a (computationally) secure DEM results in a hybrid encryption scheme in preprocessing model. We define security of each building block and prove a composition theorem that guarantees security of the final encryption system. We showthat iKEM can be realized by a one-message SKA (OW-SKA)protocol with an extended security definition. Using a OW-SKA that satisfies this extended definition of security effectively allows the secret key that is generated by the OW-SKA to be used with symmetric key encryption system such as AES in counter mode. We discuss our results and future work including providing stronger security for the final encryption, and using information theoretic DEM to construct information theoretic encryption systems.

READ FULL TEXT
research
05/10/2019

A One-Round Key Agreement Protocol with Information-Theoretic Security

Information-theoretic secure key agreement protocols do not use computat...
research
05/12/2023

Unconditionally Secure Access Control Encryption

Access control encryption (ACE) enforces, through a sanitizer as the med...
research
09/28/2018

A Symmetric Keyring Encryption Scheme for Biometric Cryptosystems

In this paper, we propose a novel biometric cryptosystem for vectorial b...
research
02/01/2021

Mosaics of combinatorial designs for information-theoretic security

We study security functions which can serve to establish semantic securi...
research
05/28/2021

Fragmentation; a Tool for Finding Information, Encryption and Data Flow in Systems

We introduce a new information-theoretic measure, fragmentation (F) whic...
research
02/21/2018

How to Subvert Backdoored Encryption: Security Against Adversaries that Decrypt All Ciphertexts

We study secure and undetectable communication in a world where governme...
research
12/05/2021

SCMCI: Secured Click and Mortar Commercial Interaction

The wide spread of click-and-mortar model offers an opportunity to consi...

Please sign up or login with your details

Forgot password? Click here to reset