Paper 2012/383

Formalization of Information-Theoretic Security for Encryption and Key Agreement, Revisited

Junji Shikata

Abstract

In this paper, we revisit formalizations of information-theoretic security for symmetric-key encryption and key agreement protocols which are very fundamental primitives in cryptography. In general, we can formalize information-theoretic security in various ways: some of them can be formalized as stand-alone security by extending (or relaxing) Shannon's perfect secrecy; some of them can be done based on composable security. Then, a natural question about this is: what is the gap between the formalizations? To answer the question, we investigate relationships between several formalizations of information-theoretic security for symmetric-key encryption and key agreement protocols. Specifically, for symmetric-key encryption protocols which may have decryption-errors, we deal with the following formalizations of security: formalizations extended (or relaxed) from Shannon's perfect secrecy by using mutual information and statistical distance; information-theoretic analogue of indistinguishability by Goldwasser and Micali; and the ones of composable security by Maurer et al. and Canetti. Then, we explicitly show that those formalizations are essentially equivalent under both one-time and multiple-use models. Under the both models, we also derive lower bounds on the adversary's (or distinguisher's) advantage and secret-key size required under all of the above formalizations. Although some of them may be already known, we can explicitly derive them all at once through our relationships between the formalizations. In addition, we briefly observe impossibility results which easily follow from the lower bounds. The similar results are also shown for key agreement protocols which may have agreement-errors.

Metadata
Available format(s)
PDF
Category
Foundations
Publication info
Published elsewhere. Unknown where it was published
Keywords
composable securityinformation-theoretic securitykey agreementsymmetric-key encryptionunconditional security
Contact author(s)
shikata @ ynu ac jp
History
2012-09-04: revised
2012-07-11: received
See all versions
Short URL
https://ia.cr/2012/383
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2012/383,
      author = {Junji Shikata},
      title = {Formalization of Information-Theoretic Security for Encryption and Key Agreement, Revisited},
      howpublished = {Cryptology ePrint Archive, Paper 2012/383},
      year = {2012},
      note = {\url{https://eprint.iacr.org/2012/383}},
      url = {https://eprint.iacr.org/2012/383}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.