Information-theoretically secure equality-testing protocol with dispute resolution

12/27/2022
by   Go Kato, et al.
0

There are often situations where two remote users each have data, and wish to (i) verify the equality of their data, and (ii) whenever a discrepancy is found afterwards, determine which of the two modified his data. The most common example is where they want to authenticate messages they exchange. Another possible example is where they have a huge database and its mirror in remote places, and whenever a discrepancy is found between their data, they can determine which of the two users is to blame. Of course, if one is allowed to use computational assumptions, this function can be realized readily, e.g., by using digital signatures. However, if one needs information-theoretic security, there is no known method that realizes this function efficiently, i.e., with secret key, communication, and trusted third parties all being sufficiently small. In order to realize this function efficiently with information-theoretic security, we here define the “equality-testing protocol with dispute resolution” as a new framework. The most significant difference between our protocol and the previous methods with similar functions is that we allow the intervention of a trusted third party when checking the equality of the data. In this new framework, we also present an explicit protocol that is information-theoretically secure and efficient.

READ FULL TEXT
research
08/10/2019

Efficient Three-party Computation: An Information-theoretic Approach from Cut-and-Choose

As far as we know, the literature on secure computation from cut-and-cho...
research
02/14/2019

Potentially Information-theoretic Secure Y00 Quantum Stream Cipher with Limited Key Lengths beyond One-Time Pad

The previous work showed that the Y00 protocol could stay secure with th...
research
05/10/2019

A One-Round Key Agreement Protocol with Information-Theoretic Security

Information-theoretic secure key agreement protocols do not use computat...
research
11/10/2021

On the efficiency of a general attack against the MOBS cryptosystem

All instances of the semidirect key exchange protocol, a generalisation ...
research
08/15/2019

Quantum preprocessing for information-theoretic security in two-party computation

In classical two-party computation, a trusted initializer who prepares c...
research
11/14/2019

Securely Computing the n-Variable Equality Function with 2n Cards

Research on the area of secure multi-party computation using a deck of p...
research
02/01/2021

Mosaics of combinatorial designs for information-theoretic security

We study security functions which can serve to establish semantic securi...

Please sign up or login with your details

Forgot password? Click here to reset