2014
DOI: 10.1007/978-3-662-44381-1_11
|View full text |Cite
|
Sign up to set email alerts
|

Amplifying Privacy in Privacy Amplification

Abstract: We study the classical problem of privacy amplification, where two parties Alice and Bob share a weak secret X of min-entropy k, and wish to agree on secret key R of length m over a public communication channel completely controlled by a computationally unbounded attacker Eve.Despite being extensively studied in the literature, the problem of designing "optimal" efficient privacy amplification protocols is still open, because there are several optimization goals. The first of them is (1) minimizing the entropy… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
5
4

Relationship

3
6

Authors

Journals

citations
Cited by 14 publications
(8 citation statements)
references
References 32 publications
0
8
0
Order By: Relevance
“…In other words, we can only extract m ≈ k − n/2 bits with post-application robustness using this technique, which is not better than what can be achieved by a 1-round protocol of Dodis, Kanukurthi, Katz, Reyzin, and Smith [7]. Fortunately, as communicated to us by [1], we can easily fix the situation at the cost of adding a third round (so that Eve no longer gets R B at the end of the second round), as follows. We use the 2-round protocol above to agree on a short (namely, O(s + log n)-bit) key K for a one-time MAC.…”
Section: Correctness If Eve Is Passive Then Pr[rmentioning
confidence: 91%
“…In other words, we can only extract m ≈ k − n/2 bits with post-application robustness using this technique, which is not better than what can be achieved by a 1-round protocol of Dodis, Kanukurthi, Katz, Reyzin, and Smith [7]. Fortunately, as communicated to us by [1], we can easily fix the situation at the cost of adding a third round (so that Eve no longer gets R B at the end of the second round), as follows. We use the 2-round protocol above to agree on a short (namely, O(s + log n)-bit) key K for a one-time MAC.…”
Section: Correctness If Eve Is Passive Then Pr[rmentioning
confidence: 91%
“…However, she still does not know if (K 1i , K 2i ) = (0, 0), (0, 1), or (1, 1). Given their high enough [14] min-entropy (H min (K 1 ) = H min (K 2 ) ≈ 0.84|K 1 | and H min (K) ≈ 0.92|K| ), it is possible for Alice and Bob to perform a privacy amplification protocol to obtain new uniform pre-shared keys.…”
Section: Impersonation Attackmentioning
confidence: 99%
“…The min-entropy of the key is nevertheless still high enough (H min (K) ≈ 0.92|K|) [14]. We propose, thus, that Alice and Bob update the pre-shared keys K 1 and K 2 by performing a privacy amplification on both of them when an attack is suspected or after a certain number of iterations of the protocol.…”
mentioning
confidence: 99%
“…Our method for proving the security leverages the security amplification technique defined over the key distribution tree (The security amplification technique benefits us starting with a weakly secure variant of some cryptographic primitive to build a strongly secure variant of the same primitive. The technique has been extensively used in the cryptography, such as collision-resistant hash functions [32], weakly verifiable puzzles [33][34][35] and encryption schemes [36]). That is, if an adversary can guess the correct value defined in the security game with a non-negligible advantage then in case that the underlying symmetric-key encryption scheme is semantically secure, either the intermediate key value k 0 of the node V 0 or the key value k 1 of the node V 1 is not uniformly distributed.…”
Section: The Provable Securitymentioning
confidence: 99%