Public-Key Encryption with Lazy Parties

被引:4
作者
Yasunaga, Kenji [1 ]
机构
[1] Kanazawa Univ, Inst Sci & Engn, Kanazawa, Ishikawa 9201192, Japan
关键词
public-key encryption; rational cryptography; lazy party; GAME-THEORY; CRYPTOGRAPHY; PRIVACY;
D O I
10.1587/transfun.E99.A.590
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In a public-key encryption scheme, if a sender is not concerned about the security of a message and is unwilling to generate costly randomness, the security of the encrypted message can be compromised. In this work, we characterize such lazy parties, who are regarded as honest parties, but are unwilling to perform a costly task when they are not concerned about the security. Specifically, we consider a rather simple setting in which the costly task is to generate randomness used in algorithms, and parties can choose either perfect randomness or a fixed string. We model lazy parties as rational players who behave rationally to maximize their utilities, and define a security game between the parties and an adversary. Since a standard secure encryption scheme does not work in this setting, we provide constructions of secure encryption schemes in various settings.
引用
收藏
页码:590 / 600
页数:11
相关论文
共 28 条
[1]  
[Anonymous], 2010, INNOV COMPUT SCI
[2]  
Asharov G, 2011, LECT NOTES COMPUT SC, V6632, P426, DOI 10.1007/978-3-642-20465-4_24
[3]   Utility Dependence in Correct and Fair Rational Secret Sharing [J].
Asharov, Gilad ;
Lindell, Yehuda .
JOURNAL OF CRYPTOLOGY, 2011, 24 (01) :157-202
[4]   Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries [J].
Aumann, Yonatan ;
Lindell, Yehuda .
JOURNAL OF CRYPTOLOGY, 2010, 23 (02) :281-343
[5]  
Beimel A., 2011, 2011396 IACR CRYPT E
[6]  
Bellare M, 2009, LECT NOTES COMPUT SC, V5912, P232, DOI 10.1007/978-3-642-10366-7_14
[7]  
Bosley C, 2007, LECT NOTES COMPUT SC, V4392, P1
[8]  
Canetti R., 1999, Proceedings of the Thirty-First Annual ACM Symposium on Theory of Computing, P255, DOI 10.1145/301250.301313
[9]  
Canetti R., 1996, Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, P639, DOI 10.1145/237814.238015
[10]   On the (Im)possibility of cryptography with imperfect randomness [J].
Dodis, Y ;
Ong, SJ ;
Prabhakaran, M ;
Sahai, A .
45TH ANNUAL IEEE SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 2004, :196-205