
Security of weak secrets based cryptographic primitives via the Rényi entropy
Author(s) -
Yao Yanqing,
Li Zhoujun
Publication year - 2016
Publication title -
iet information security
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.308
H-Index - 34
eISSN - 1751-8717
pISSN - 1751-8709
DOI - 10.1049/iet-ifs.2015.0007
Subject(s) - pairwise independence , cryptography , entropy (arrow of time) , cryptographic primitive , hash function , theoretical computer science , computer science , encryption , pseudorandom generator , mathematics , pseudorandom number generator , discrete mathematics , random variable , algorithm , cryptographic protocol , random function , computer security , statistics , physics , algebra of random variables , quantum mechanics
In ideality, cryptographic primitives take for granted that the secret sources are derived from uniform distribution. However, in reality, we may only obtain some ‘weak’ random sources guaranteed with high unpredictability (e.g. biometric data, physical sources, and secrets with partial leakage). Formally, the security of cryptographic primitives is measured by the expectation of some function, called ‘perfect’ expectation in the ideal model and ‘weak’ expectation in the real model. The authors propose some elementary inequalities which show that the ‘weak’ expectation is not much worse than the ‘perfect’ expectation. The authors present how to overcome weak expectations dependent on the Rényi entropy other than the min and collision entropies by Dodis and Yu [TCC 2013]. The authors achieve these results by capturing on two approaches: one is by observing a new relationship between the collision entropy and other Rényi entropy, the other is by developing the connection between different moments of a variable. Furthermore, pseudorandom generator, and pairwise independent hash function family, the authors extend key derivation functions based on the Rényi entropy. The results are applied to all unpredictability applications and ‘square‐friendly’ indistinguishability applications including CPA‐secure symmetric‐key encryption schemes.