TY - GEN
T1 - On the security of pseudorandomized information-theoretically secure schemes
AU - Nuida, Koji
AU - Hanaoka, Goichiro
N1 - Funding Information:
A part of this work was supported by 2007 Research Grants of the Science and Technology Foundation of Japan (JSTF).
PY - 2010
Y1 - 2010
N2 - Dubrov and Ishai (STOC 2006) revealed, by generalizing the notion of pseudorandom generators (PRGs), that under a computational assumption, randomness in a protocol can be replaced with pseudorandomness in an indistinguishable way for an adversary even if his algorithm has unbounded complexity. However, their argument was applied only to some special protocols. In this article, we first show that their argument is not effective for a wide class of more general protocols. Then we propose a novel evaluation technique for such indistinguishability that is based on usual PRGs and is effective for those more general protocols. Examples of such protocols include parallel computation over honest-but-curious modules, secret sharing, broadcast encryption, traitor tracing, and collusion-secure codes.
AB - Dubrov and Ishai (STOC 2006) revealed, by generalizing the notion of pseudorandom generators (PRGs), that under a computational assumption, randomness in a protocol can be replaced with pseudorandomness in an indistinguishable way for an adversary even if his algorithm has unbounded complexity. However, their argument was applied only to some special protocols. In this article, we first show that their argument is not effective for a wide class of more general protocols. Then we propose a novel evaluation technique for such indistinguishability that is based on usual PRGs and is effective for those more general protocols. Examples of such protocols include parallel computation over honest-but-curious modules, secret sharing, broadcast encryption, traitor tracing, and collusion-secure codes.
UR - http://www.scopus.com/inward/record.url?scp=78149272734&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=78149272734&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-14496-7_6
DO - 10.1007/978-3-642-14496-7_6
M3 - Conference contribution
AN - SCOPUS:78149272734
SN - 3642144950
SN - 9783642144950
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 56
EP - 73
BT - Information Theoretic Security - 4th International Conference, ICITS 2009, Revised Selected Papers
T2 - 4th International Conference on Information Theoretic Security, ICITS 2009
Y2 - 3 December 2009 through 6 December 2009
ER -