条件加密与个性化密码错别字校正安全应用

Mohammad Hassan Ameri, Jeremiah Blocki
{"title":"条件加密与个性化密码错别字校正安全应用","authors":"Mohammad Hassan Ameri, Jeremiah Blocki","doi":"arxiv-2409.06128","DOIUrl":null,"url":null,"abstract":"We introduce the notion of a conditional encryption scheme as an extension of\npublic key encryption. In addition to the standard public key algorithms\n($\\mathsf{KG}$, $\\mathsf{Enc}$, $\\mathsf{Dec}$) for key generation, encryption\nand decryption, a conditional encryption scheme for a binary predicate $P$ adds\na new conditional encryption algorithm $\\mathsf{CEnc}$. The conditional\nencryption algorithm $c=\\mathsf{CEnc}_{pk}(c_1,m_2,m_3)$ takes as input the\npublic encryption key $pk$, a ciphertext $c_1 = \\mathsf{Enc}_{pk}(m_1)$ for an\nunknown message $m_1$, a control message $m_2$ and a payload message $m_3$ and\noutputs a conditional ciphertext $c$. Intuitively, if $P(m_1,m_2)=1$ then the\nconditional ciphertext $c$ should decrypt to the payload message $m_3$. On the\nother hand if $P(m_1,m_2) = 0$ then the ciphertext should not leak any\ninformation about the control message $m_2$ or the payload message $m_3$ even\nif the attacker already has the secret decryption key $sk$. We formalize the\nnotion of conditional encryption secrecy and provide concretely efficient\nconstructions for a set of predicates relevant to password typo correction. Our\npractical constructions utilize the Paillier partially homomorphic encryption\nscheme as well as Shamir Secret Sharing. We prove that our constructions are\nsecure and demonstrate how to use conditional encryption to improve the\nsecurity of personalized password typo correction systems such as TypTop. We\nimplement a C++ library for our practically efficient conditional encryption\nschemes and evaluate the performance empirically. We also update the\nimplementation of TypTop to utilize conditional encryption for enhanced\nsecurity guarantees and evaluate the performance of the updated implementation.","PeriodicalId":501332,"journal":{"name":"arXiv - CS - Cryptography and Security","volume":"44 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Conditional Encryption with Applications to Secure Personalized Password Typo Correction\",\"authors\":\"Mohammad Hassan Ameri, Jeremiah Blocki\",\"doi\":\"arxiv-2409.06128\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We introduce the notion of a conditional encryption scheme as an extension of\\npublic key encryption. In addition to the standard public key algorithms\\n($\\\\mathsf{KG}$, $\\\\mathsf{Enc}$, $\\\\mathsf{Dec}$) for key generation, encryption\\nand decryption, a conditional encryption scheme for a binary predicate $P$ adds\\na new conditional encryption algorithm $\\\\mathsf{CEnc}$. The conditional\\nencryption algorithm $c=\\\\mathsf{CEnc}_{pk}(c_1,m_2,m_3)$ takes as input the\\npublic encryption key $pk$, a ciphertext $c_1 = \\\\mathsf{Enc}_{pk}(m_1)$ for an\\nunknown message $m_1$, a control message $m_2$ and a payload message $m_3$ and\\noutputs a conditional ciphertext $c$. Intuitively, if $P(m_1,m_2)=1$ then the\\nconditional ciphertext $c$ should decrypt to the payload message $m_3$. On the\\nother hand if $P(m_1,m_2) = 0$ then the ciphertext should not leak any\\ninformation about the control message $m_2$ or the payload message $m_3$ even\\nif the attacker already has the secret decryption key $sk$. We formalize the\\nnotion of conditional encryption secrecy and provide concretely efficient\\nconstructions for a set of predicates relevant to password typo correction. Our\\npractical constructions utilize the Paillier partially homomorphic encryption\\nscheme as well as Shamir Secret Sharing. We prove that our constructions are\\nsecure and demonstrate how to use conditional encryption to improve the\\nsecurity of personalized password typo correction systems such as TypTop. We\\nimplement a C++ library for our practically efficient conditional encryption\\nschemes and evaluate the performance empirically. We also update the\\nimplementation of TypTop to utilize conditional encryption for enhanced\\nsecurity guarantees and evaluate the performance of the updated implementation.\",\"PeriodicalId\":501332,\"journal\":{\"name\":\"arXiv - CS - Cryptography and Security\",\"volume\":\"44 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2024-09-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"arXiv - CS - Cryptography and Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/arxiv-2409.06128\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"arXiv - CS - Cryptography and Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/arxiv-2409.06128","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

我们引入了条件加密方案的概念,作为公钥加密的扩展。除了用于密钥生成、加密和解密的标准公钥算法($\mathsf{KG}$, $\mathsf{Enc}$, $\mathsf{Dec}$)之外,二元谓词 $P$ 的条件加密算法还增加了一个新的条件加密算法 $\mathsf{CEnc}$。条件加密算法$c=\mathsf{CEnc}_{pk}(c_1,m_2,m_3)$的输入是公开加密密钥$pk$、未知信息$m_1$的密文$c_1 = \mathsf{Enc}_{pk}(m_1)$、控制信息$m_2$和有效载荷信息$m_3$,并输出条件密文$c$。直观地说,如果 $P(m_1,m_2)=1$,那么条件密码文 $c$ 应解密为有效载荷信息 $m_3$。另一方面,如果 $P(m_1,m_2)=0$,那么即使攻击者已经掌握了解密密钥 $sk$,密文也不会泄露任何有关控制信息 $m_2$ 或有效信息 $m_3$ 的信息。我们正式提出了条件加密保密的概念,并为一组与密码错字校正相关的谓词提供了具体有效的结构。我们的实际构造利用了派利尔(Paillier)部分同态加密算法和沙米尔秘密共享(Shamir Secret Sharing)。我们证明了我们的构造是安全的,并演示了如何使用条件加密来提高 TypTop 等个性化密码错别字纠正系统的安全性。我们为我们实际有效的条件加密算法实现了一个 C++ 库,并对其性能进行了经验评估。我们还更新了 TypTop 的实现,以利用条件加密来增强安全保证,并评估了更新后实现的性能。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Conditional Encryption with Applications to Secure Personalized Password Typo Correction
We introduce the notion of a conditional encryption scheme as an extension of public key encryption. In addition to the standard public key algorithms ($\mathsf{KG}$, $\mathsf{Enc}$, $\mathsf{Dec}$) for key generation, encryption and decryption, a conditional encryption scheme for a binary predicate $P$ adds a new conditional encryption algorithm $\mathsf{CEnc}$. The conditional encryption algorithm $c=\mathsf{CEnc}_{pk}(c_1,m_2,m_3)$ takes as input the public encryption key $pk$, a ciphertext $c_1 = \mathsf{Enc}_{pk}(m_1)$ for an unknown message $m_1$, a control message $m_2$ and a payload message $m_3$ and outputs a conditional ciphertext $c$. Intuitively, if $P(m_1,m_2)=1$ then the conditional ciphertext $c$ should decrypt to the payload message $m_3$. On the other hand if $P(m_1,m_2) = 0$ then the ciphertext should not leak any information about the control message $m_2$ or the payload message $m_3$ even if the attacker already has the secret decryption key $sk$. We formalize the notion of conditional encryption secrecy and provide concretely efficient constructions for a set of predicates relevant to password typo correction. Our practical constructions utilize the Paillier partially homomorphic encryption scheme as well as Shamir Secret Sharing. We prove that our constructions are secure and demonstrate how to use conditional encryption to improve the security of personalized password typo correction systems such as TypTop. We implement a C++ library for our practically efficient conditional encryption schemes and evaluate the performance empirically. We also update the implementation of TypTop to utilize conditional encryption for enhanced security guarantees and evaluate the performance of the updated implementation.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
PAD-FT: A Lightweight Defense for Backdoor Attacks via Data Purification and Fine-Tuning Artemis: Efficient Commit-and-Prove SNARKs for zkML A Survey-Based Quantitative Analysis of Stress Factors and Their Impacts Among Cybersecurity Professionals Log2graphs: An Unsupervised Framework for Log Anomaly Detection with Efficient Feature Extraction Practical Investigation on the Distinguishability of Longa's Atomic Patterns
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1