On the Information-theoretic Security of Combinatorial All-or-nothing Transforms

02/21/2022
by   Yujie Gu, et al.
0

All-or-nothing transforms (AONT) were proposed by Rivest as a message preprocessing technique for encrypting data to protect against brute-force attacks, and have numerous applications in cryptography and information security. Later the unconditionally secure AONT and their combinatorial characterization were introduced by Stinson. Informally, a combinatorial AONT is an array with the unbiased requirements and its security properties in general depend on the prior probability distribution on the inputs s-tuples. Recently, it was shown by Esfahani and Stinson that a combinatorial AONT has perfect security provided that all the inputs s-tuples are equiprobable, and has weak security provided that all the inputs s-tuples are with non-zero probability. This paper aims to explore on the gap between perfect security and weak security for combinatorial (t,s,v)-AONTs. Concretely, we consider the typical scenario that all the s inputs take values independently (but not necessarily identically) and quantify the amount of information H(𝒳|𝒴) about any t inputs 𝒳 that is not revealed by any s-t outputs 𝒴. In particular, we establish the general lower and upper bounds on H(𝒳|𝒴) for combinatorial AONTs using information-theoretic techniques, and also show that the derived bounds can be attained in certain cases. Furthermore, the discussions are extended for the security properties of combinatorial asymmetric AONTs.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
05/31/2021

Asymmetric All-or-nothing Transforms

In this paper, we initiate a study of asymmetric all-or-nothing transfor...
research
02/13/2018

The Birthday Problem and Zero-Error List Codes

As an attempt to bridge the gap between classical information theory and...
research
02/01/2021

Mosaics of combinatorial designs for information-theoretic security

We study security functions which can serve to establish semantic securi...
research
05/15/2021

On Converse Results for Secure Index Coding

In this work, we study the secure index coding problem where there are s...
research
11/10/2021

Rectangular, Range, and Restricted AONTs: Three Generalizations of All-or-Nothing Transforms

All-or-nothing transforms (AONTs) were originally defined by Rivest as b...
research
11/09/2018

Provably Secure Steganography on Generative Media

In this paper, we propose provably secure steganography on generative me...
research
11/04/2019

Improving Supervised Phase Identification Through the Theory of Information Losses

This paper considers the problem of Phase Identification in power distri...

Please sign up or login with your details

Forgot password? Click here to reset