On the Information-theoretic Security of Combinatorial All-or-nothing Transforms

All-or-nothing transforms (AONTs) were proposed by Rivest as a message preprocessing technique for encrypting data to protect against brute-force attacks, and have numerous applications in cryptography and information security. Later the unconditionally secure AONTs and their combinatorial character...

Full description

Bibliographic Details
Main Authors: Akao, S. (Author), Esfahani, N.N (Author), Gu, Y. (Author), Miao, Y. (Author), Sakurai, K. (Author)
Format: Article
Language:English
Published: Institute of Electrical and Electronics Engineers Inc. 2022
Subjects:
Online Access:View Fulltext in Publisher
LEADER 02820nam a2200433Ia 4500
001 10.1109-TIT.2022.3174008
008 220630s2022 CNT 000 0 und d
020 |a 00189448 (ISSN) 
245 1 0 |a On the Information-theoretic Security of Combinatorial All-or-nothing Transforms 
260 0 |b Institute of Electrical and Electronics Engineers Inc.  |c 2022 
520 3 |a All-or-nothing transforms (AONTs) were proposed by Rivest as a message preprocessing technique for encrypting data to protect against brute-force attacks, and have numerous applications in cryptography and information security. Later the unconditionally secure AONTs and their combinatorial characterization were introduced by Stinson. Informally, a combinatorial AONT is an array with the unbiased requirements and its security properties in general depend on the prior probability distribution on the inputs s-tuples. Recently, it was shown by Esfahani and Stinson that a combinatorial AONT has perfect security provided that all the inputs s-tuples are equiprobable, and has weak security provided that all the inputs s-tuples are with non-zero probability. This paper aims to explore on the gap between perfect security and weak security for combinatorial (t, s, v)-AONTs. Concretely, we consider the typical scenario that all the s inputs take values independently (but not necessarily identically) and quantify the amount of information H(X|Y) about any t inputs X that is not revealed by any s – t outputs Y. In particular, we establish the general lower and upper bounds on H(X|Y) for combinatorial AONTs using information-theoretic techniques, and also show that the derived bounds can be attained in certain cases. Furthermore, the discussions are extended for the security properties of combinatorial asymmetric AONTs. IEEE 
650 0 4 |a All or nothings 
650 0 4 |a Brute-force attack 
650 0 4 |a Cryptography 
650 0 4 |a Electronic mail 
650 0 4 |a Information security 
650 0 4 |a Information- theoretic securities 
650 0 4 |a Information theory 
650 0 4 |a Perfect securities 
650 0 4 |a Pre-processing techniques 
650 0 4 |a Probability distribution 
650 0 4 |a Probability distributions 
650 0 4 |a Probability: distributions 
650 0 4 |a Random variables 
650 0 4 |a Security 
650 0 4 |a Security 
650 0 4 |a Security of data 
650 0 4 |a Security properties 
650 0 4 |a Transforms 
650 0 4 |a Unconditionally secure 
650 0 4 |a Upper bound 
650 0 4 |a Upper Bound 
700 1 0 |a Akao, S.  |e author 
700 1 0 |a Esfahani, N.N.  |e author 
700 1 0 |a Gu, Y.  |e author 
700 1 0 |a Miao, Y.  |e author 
700 1 0 |a Sakurai, K.  |e author 
773 |t IEEE Transactions on Information Theory 
856 |z View Fulltext in Publisher  |u https://doi.org/10.1109/TIT.2022.3174008