Proceedings of the Forty-First Annual ACM Symposium on Theory of Computing 2009
DOI: 10.1145/1536414.1536496
|View full text |Cite
|
Sign up to set email alerts
|

Non-malleable extractors and symmetric key cryptography from weak secrets

Abstract: We study the question of basing symmetric key cryptography on weak secrets. In this setting, Alice and Bob share an n-bit secret W , which might not be uniformly random, but the adversary has at least k bits of uncertainty about it (formalized using conditional min-entropy). Since standard symmetrickey primitives require uniformly random secret keys, we would like to construct an authenticated key agreement protocol in which Alice and Bob use W to agree on a nearly uniform key R, by communicating over a public… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

2
218
0
3

Year Published

2013
2013
2019
2019

Publication Types

Select...
8

Relationship

2
6

Authors

Journals

citations
Cited by 112 publications
(223 citation statements)
references
References 34 publications
2
218
0
3
Order By: Relevance
“…While we believe that non-malleable key derivation is an interesting notion on its own (e.g., it can be viewed as a dual version of non-malleable extractors [17]), we also show it has useful applications for tamper resilience. For instance, consider some cryptographic scheme G using a uniform key in y ← {0, 1} k .…”
Section: Our Contributionmentioning
confidence: 84%
See 1 more Smart Citation
“…While we believe that non-malleable key derivation is an interesting notion on its own (e.g., it can be viewed as a dual version of non-malleable extractors [17]), we also show it has useful applications for tamper resilience. For instance, consider some cryptographic scheme G using a uniform key in y ← {0, 1} k .…”
Section: Our Contributionmentioning
confidence: 84%
“…Note that the above definition can be interpreted as a dual version of the definition of nonmalleable extractors [17]. 2 The theorem below states that by sampling a function h from a set H of t-wise independent hash functions, we obtain a non-malleable key derivation function with overwhelming probability.…”
Section: Figure 1: Experiments Defining a Non-malleable Key Derivatiomentioning
confidence: 99%
“…Next, we consider the case of q = 2, where the notion of (2, ε)-wise independence in the k = (m − d)-real 2 model becomes a non-malleable extractor [14] (for Renyi entropy; the case q = 1 collapses to the setting of weak PRF considered in the previous section).…”
Section: Definition 6 (Weak (Q δ)-Wise Independence)mentioning
confidence: 99%
“…Randomness extractors are widely used in cryptographic applications (see, e.g., [25,87,99,100,199,200,218,348]). This includes applications in construction of pseudorandom generators from one-way functions, design of cryptographic functionalities from noisy and weak sources, construction of key derivation functions, and extracting many private bits even when the adversary knows all except log Ω(1) n of the n bits [251] (see also [250]).…”
Section: A|mentioning
confidence: 99%