scispace - formally typeset
Open Access

Concealment and its applications to authenticated encryption

Yevgeniy Dodis, +1 more
- Vol. 2656, pp 312-329
Reads0
Chats0
TLDR
In this article, the authors introduce the notion of concealment, which is related to commitment but quite different from commitment, and show that concealments are exactly the right abstraction allowing one to use authenticated encryption for encrypting long messages.
Abstract
We introduce a new cryptographic primitive we call concealment, which is related, but quite different from the notion of commitment. A concealment is a publicly known randomized transformation, which, on inputm, outputs a hider h and a binder b. Together, h and b allow one to recoverm, but separately, (1) the hider h reveals “no information” about m, while (2) the binder b can be “meaningfully opened” by at most one hider h. While setting b = m, h = ∅ is a trivial concealment, the challenge is to make |b| |m|, which we call a “non-trivial” concealment. We show that non-trivial concealments are equivalent to the existence of collision-resistant hash functions. Moreover, our construction of concealments is extremely simple, optimal, and yet very general, giving rise to a multitude of efficient implementations. We show that concealments have natural and important applications in the area of authenticated encryption. Specifically, let AE be an authenticated encryption scheme (either publicor symmetric-key) designed to work on short messages. We show that concealments are exactly the right abstraction allowing one to use AE for encrypting long messages. Namely, to encrypt “long” m, one uses a concealment scheme to get h and b, and outputs authenticated ciphertext 〈AE(b), h〉. More surprisingly, the above paradigm leads to a very simple and general solution to the problem of remotely keyed (authenticated) encryption (RKAE) [12, 13]. In this problem, one wishes to split the task of high-bandwidth authenticated encryption between a secure, but low-bandwidth/computationally limited device, and an insecure, but computationally powerful host. We give formal definitions for RKAE, which we believe are simpler and more natural than all the previous definitions. We then show that our composition paradigm satisfies our (very strong) definition. Namely, for authenticated encryption, the host simply sends a short value b to the device (which stores the actual secret key for AE), gets back AE(b), and outputs 〈AE(b), h〉 (authenticated decryption is similar). Finally, we also observe that the particular schemes of [13, 18] are all special examples of our general paradigm.

read more

Citations
More filters
Book ChapterDOI

Tag-KEM/DEM: a new framework for hybrid encryption and a new analysis of kurosawa-desmedt KEM

TL;DR: In this article, a generic framework for generic construction of hybrid encryption schemes secure against chosen ciphertext attack is presented, which yields new and more efficient CCA-secure schemes, and provides insightful explanations about existing schemes that do not fit into the previous frameworks.
Journal ArticleDOI

Breaking and provably repairing the SSH authenticated encryption scheme: A case study of the Encode-then-Encrypt-and-MAC paradigm

TL;DR: The secure shell (SSH) protocol is one of the most popular cryptographic protocols on the Internet as mentioned in this paper, however, the current SSH authenticated encryption mechanism is insecure and it is not secure.
Proceedings ArticleDOI

Secure deletion for a versioning file system

TL;DR: Algorithms and an architecture for the secure deletion of individual versions of a file and two methods for secure deletion that use a combination of authenticated encryption and secure overwriting are presented.
Journal ArticleDOI

Speeding up Exponentiation using an Untrusted Computational Resource

TL;DR: A fifth protocol to perform variable-base variable- exponent exponentiation, which also has this feature, is introduced and a model allows the trusted resource to perform computations in its idle time.
Book ChapterDOI

Efficient consistency proofs for generalized queries on a committed database

TL;DR: A general technique for constructing cqps for any type of query, assuming the existence of a data structure/algorithm with certain inherent robustness properties that is called a data robust algorithm is put forward.
Related Papers (5)