TU Darmstadt / ULB / TUbiblio

Information-Theoretic Security of Cryptographic Channels

Fischlin, Marc ; Günther, Felix ; Muth, Philipp (2020)
Information-Theoretic Security of Cryptographic Channels.
22nd International Conference on Information and Communications Security (ICICS 2020). virtual Conference (24.-26.08.2021)
doi: 10.1007/978-3-030-61078-4_17
Conference or Workshop Item, Bibliographie

Abstract

We discuss the setting of information-theoretically secure channel protocols where confidentiality of transmitted data should hold against unbounded adversaries. We argue that there are two possible scenarios: One is that the adversary is currently bounded, but stores today's communication and tries to break confidentiality later when obtaining more computational power or time. We call channel protocols protecting against such attacks future-secure. The other scenario is that the adversary already has extremely strong computational powers and may try to use that power to break current executions. We call channels withstanding such stronger attacks unconditionally-secure.

Item Type: Conference or Workshop Item
Erschienen: 2020
Creators: Fischlin, Marc ; Günther, Felix ; Muth, Philipp
Type of entry: Bibliographie
Title: Information-Theoretic Security of Cryptographic Channels
Language: English
Date: 28 November 2020
Publisher: Springer Nature
Book Title: Information and Communications Security
Event Title: 22nd International Conference on Information and Communications Security (ICICS 2020)
Event Location: virtual Conference
Event Dates: 24.-26.08.2021
DOI: 10.1007/978-3-030-61078-4_17
Corresponding Links:
Abstract:

We discuss the setting of information-theoretically secure channel protocols where confidentiality of transmitted data should hold against unbounded adversaries. We argue that there are two possible scenarios: One is that the adversary is currently bounded, but stores today's communication and tries to break confidentiality later when obtaining more computational power or time. We call channel protocols protecting against such attacks future-secure. The other scenario is that the adversary already has extremely strong computational powers and may try to use that power to break current executions. We call channels withstanding such stronger attacks unconditionally-secure.

Uncontrolled Keywords: Solutions, S4, S6
Additional Information:

Part of the Lecture Notes in Computer Science book series (LNCS, Vol. 12282)

Divisions: 20 Department of Computer Science
20 Department of Computer Science > Cryptography and Privacy Engineering (ENCRYPTO)
20 Department of Computer Science > Cryptography and Complexity Theory
20 Department of Computer Science > Security Engineering
DFG-Collaborative Research Centres (incl. Transregio)
DFG-Collaborative Research Centres (incl. Transregio) > Collaborative Research Centres
Profile Areas
Profile Areas > Cybersecurity (CYSEC)
DFG-Collaborative Research Centres (incl. Transregio) > Collaborative Research Centres > CRC 1119: CROSSING – Cryptography-Based Security Solutions: Enabling Trust in New and Next Generation Computing Environments
Date Deposited: 18 May 2021 07:12
Last Modified: 18 May 2021 07:12
PPN:
Corresponding Links:
Export:
Suche nach Titel in: TUfind oder in Google
Send an inquiry Send an inquiry

Options (only for editors)
Show editorial Details Show editorial Details