259 research outputs found
Primal-dual distance bounds of linear codes with application to cryptography
Let denote the minimum length of a linear code with
and , where is the minimum Hamming distance of and
is the minimum Hamming distance of . In this paper, we
show a lower bound and an upper bound on . Further, for small
values of and , we determine and give a generator
matrix of the optimum linear code. This problem is directly related to the
design method of cryptographic Boolean functions suggested by Kurosawa et al.Comment: 6 pages, using IEEEtran.cls. To appear in IEEE Trans. Inform. Theory,
Sept. 2006. Two authors were added in the revised versio
Environmental regulatory reform for Japanese fishing port development : adopting U.S. regulatory framework to the Japanese system
Thesis (M.C.P.)--Massachusetts Institute of Technology, Dept. of Urban Studies and Planning, 1997.Includes bibliographical references (leaves 102-104).by Kaoru Kurosawa.M.C.P
Power of a Public Random Permutation and its Application to Authenticated-Encryption
In this paper,
we first show that many independent pseudorandom permutations
over
can be obtained
from a single public random permutation
and secret bits.
We next prove that a slightly modified IAPM is secure even if
the underlying block cipher
is publicly accessible (as a blackbox).
We derive a similar result for OCB mode, too.
We finally prove that
our security bound is tight within a constant factor
Round-Efficient Perfectly Secure Message Transmission Scheme Against General Adversary
In the model of Perfectly Secure Message Transmission Schemes (PSMTs), there are channels between a sender and a receiver,
and they share no key. An infinitely powerful adversary can corrupt (observe and forge) the messages sent through
some subset of channels. For non-threshold adversaries called , Kumar et al. showed a many round PSMT \cite{KGSR}.
In this paper, we show round efficient PSMTs against -adevrsaries. We first give a -round PSMT which runs in polynomial time in the size of the underlying linear secret sharing scheme. We next present a -round PSMT which is inefficient in general. (However, it is efficient for some special case.
On the bound for anonymous secret sharing schemes
AbstractIn anonymous secret sharing schemes, the secret can be reconstructed without knowledge of which participants hold which shares. In this paper, we derive a tighter lower bound on the size of the shares than the bound of Blundo and Stinson for anonymous (k,n)-threshold schemes with 1<k<n. Our bound is tight for k=2. We also show a close relationship between optimum anonymous (2,n)-threshold secret schemes and combinatorial designs
Truly Efficient 2-Round Perfectly Secure Message Transmission Scheme
In the model of perfectly secure message transmission schemes (PSMTs), there are channels between a sender and a receiver. An infinitely powerful adversary \A may corrupt (observe and forge)the messages sent through out of channels. The sender wishes to send a secret to the receiver perfectly privately and perfectly reliably without sharing any key with the receiver.
In this paper, we show the first -round PSMT for such that not only the transmission rate is but also the computational costs of the sender and the receiver are both polynomial in . This means that we solve the open problem raised by
Agarwal, Cramer and de Haan at CRYPTO 2006
Almost Secure (1-Round, n-Channel) Message Transmission Scheme
It is known that perfectly secure (-round, -channel) message transmission (MT) schemes exist if and only if ,
where is the number of channels that the adversary can corrupt.
Then does there exist an {\it almost} secure MT scheme for ? In this paper, we first sum up a number flaws of the previous {\it almost} secure MT scheme presented at Crypto 2004. (The authors already noted in thier presentation at Crypto\u272004 that their scheme was flawed.) We next show an equivalence between almost secure MT schemes and secret sharing schemes with cheaters. By using our equivalence, we derive a lower bound on the communication complexity
of almost secure MT schemes. Finally, we present a near optimum scheme which meets our bound approximately. This is the first construction of provably secure almost secure (-round, -channel) MT schemes for
How to Factor N_1 and N_2 When p_1=p_2 mod 2^t
Let and be two different RSA moduli. Suppose that for some , and and are bit primes. Then May and Ritzenhofen showed that and can be factored in quadratic time if
In this paper, we improve this lower bound on . Namely we prove that and can be factored in quadratic time if
Further our simulation result shows that our bound is tight
Efficient No-dictionary Verifiable SSE
In the model of no-dictionary verifiable searchable symmetric encryption (SSE) scheme, a client does not need to keep the set of keywords in the search phase, where is called a dictionary. Still a malicious server cannot cheat the client by saying that ``your search word does not exist in the dictionary when it exists. In the previous such schemes, it takes time for the server to prove that , where is the number of keywords.
In this paper, we show a generic method to transform any SSE scheme (that is only secure against passive adversaries) to a no-dictionary verifiable SSE scheme. In the transformed scheme, it takes only time for the server to prove that
- β¦