Can't touch this: unconditional tamper evidence from short keys

B. V. D. Vecht, Xavier Coiteux-Roy, Boris Skoric
{"title":"Can't touch this: unconditional tamper evidence from short keys","authors":"B. V. D. Vecht, Xavier Coiteux-Roy, Boris Skoric","doi":"10.26421/qic22.5-6-1","DOIUrl":null,"url":null,"abstract":"Storing data on an external server with information-theoretic security, while using a key shorter than the data itself, is impossible. As an alternative, we propose a scheme that achieves information-theoretically secure tamper evidence: The server is able to obtain information about the stored data, but not while staying undetected. Moreover, the client only needs to remember a key whose length is much shorter than the data. We provide a security proof for our scheme, based on an entropic uncertainty relation, similar to QKD proofs. Our scheme works if Alice is able to (reversibly) randomise the message to almost-uniformity with only a short key. By constructing an explicit attack we show that short-key unconditional tamper evidence cannot be achieved without this randomisability.","PeriodicalId":20904,"journal":{"name":"Quantum Inf. Comput.","volume":"23 1","pages":"361-384"},"PeriodicalIF":0.0000,"publicationDate":"2020-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Quantum Inf. Comput.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.26421/qic22.5-6-1","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

Storing data on an external server with information-theoretic security, while using a key shorter than the data itself, is impossible. As an alternative, we propose a scheme that achieves information-theoretically secure tamper evidence: The server is able to obtain information about the stored data, but not while staying undetected. Moreover, the client only needs to remember a key whose length is much shorter than the data. We provide a security proof for our scheme, based on an entropic uncertainty relation, similar to QKD proofs. Our scheme works if Alice is able to (reversibly) randomise the message to almost-uniformity with only a short key. By constructing an explicit attack we show that short-key unconditional tamper evidence cannot be achieved without this randomisability.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
不能碰这个:短密钥的无条件篡改证据
将数据存储在具有信息论安全性的外部服务器上,同时使用比数据本身短的密钥,这是不可能的。作为一种替代方案,我们提出了一种实现信息理论上安全的篡改证据的方案:服务器能够获取有关存储数据的信息,但不能在不被发现的情况下获取。而且,客户端只需要记住一个长度比数据短得多的键。我们基于熵不确定性关系为我们的方案提供了一个安全性证明,类似于QKD证明。如果Alice能够(可逆地)用一个短密钥将消息随机化到几乎一致,我们的方案就有效。通过构造一个显式攻击,我们表明没有这种随机性就无法获得短密钥无条件篡改证据。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
A quantization of interacting particle systems Guidelines to use the ICSM for developing quantum-classical systems A Comparative Analysis of Quantum-based Approaches for Scalable and Efficient Data mining in Cloud Environments On the quantum complexity of integration of a function with unknown singularity Site recurrence for continuous-time open quantum walks on the line
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1