Unconditionally Secure Access Control Encryption

05/12/2023
by   Cheuk Ting Li, et al.
0

Access control encryption (ACE) enforces, through a sanitizer as the mediator, that only legitimate sender-receiver pairs can communicate, without the sanitizer knowing the communication metadata, including its sender and recipient identity, the policy over them, and the underlying plaintext. Any illegitimate transmission is indistinguishable from pure noise. Existing works focused on computational security and require trapdoor functions and possibly other heavyweight primitives. We present the first ACE scheme with information-theoretic security (unconditionally against unbounded adversaries). Our novel randomization techniques over matrices realize sanitization (traditionally via homomorphism over a fixed randomness space) such that the secret message in the hidden message subspace remains intact if and only if there is no illegitimate transmission.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
02/03/2021

Information-theoretic Key Encapsulation and its Application to Secure Communication

A hybrid encryption scheme is a public key encryption system that consis...
research
02/11/2023

Powerful Primitives in the Bounded Quantum Storage Model

The bounded quantum storage model aims to achieve security against compu...
research
07/28/2022

Certified Everlasting Functional Encryption

Computational security in cryptography has a risk that computational ass...
research
02/21/2018

How to Subvert Backdoored Encryption: Security Against Adversaries that Decrypt All Ciphertexts

We study secure and undetectable communication in a world where governme...
research
02/28/2023

Uncloneable Cryptographic Primitives with Interaction

Much of the strength of quantum cryptography may be attributed to the no...
research
11/10/2021

Anonymous communication system provides a secure environment without leaking metadata, which has many application scenarios in IoT

Anonymous Identity Based Encryption (AIBET) scheme allows a tracer to us...
research
11/14/2017

Barrel Shifter Physical Unclonable Function Based Encryption

Physical Unclonable Functions (PUFs) are circuits designed to extract ph...

Please sign up or login with your details

Forgot password? Click here to reset