Visible to the public On the Security Properties of Combinatorial All-or-nothing Transforms

TitleOn the Security Properties of Combinatorial All-or-nothing Transforms
Publication TypeConference Paper
Year of Publication2022
AuthorsGu, Yujie, Akao, Sonata, Esfahani, Navid Nasr, Miao, Ying, Sakurai, Kouichi
Conference Name2022 IEEE International Symposium on Information Theory (ISIT)
KeywordsCollaboration, combinatorial all-or-nothing transform, composability, compositionality, conditional entropy, cryptography, Entropy, Human Behavior, human factors, Information security, information theoretic security, Metrics, perfect security, policy-based governance, Probability distribution, pubcrawl, resilience, Resiliency, Scalability, security, Transforms, Upper bound, weak security
AbstractAll-or-nothing transforms (AONT) were proposed by Rivest as a message preprocessing technique for encrypting data to protect against brute-force attacks, and have many applications in cryptography and information security. Later the unconditionally secure AONT and their combinatorial characterization were introduced by Stinson. Informally, a combinatorial AONT is an array with the unbiased requirements and its security properties in general depend on the prior probability distribution on the inputs s-tuples. Recently, it was shown by Esfahani and Stinson that a combinatorial AONT has perfect security provided that all the inputs s-tuples are equiprobable, and has weak security provided that all the inputs s-tuples are with non-zero probability. This paper aims to explore on the gap between perfect security and weak security for combinatorial (t, s, v)-AONTs. Concretely, we consider the typical scenario that all the s inputs take values independently (but not necessarily identically) and quantify the amount of information H(\textbackslashmathcalX\textbackslashmid \textbackslashmathcalY) about any t inputs \textbackslashmathcalX that is not revealed by any st outputs \textbackslashmathcalY. In particular, we establish the general lower and upper bounds on H(\textbackslashmathcalX\textbackslashmid \textbackslashmathcalY) for combinatorial AONTs using information-theoretic techniques, and also show that the derived bounds can be attained in certain cases.
DOI10.1109/ISIT50566.2022.9834366
Citation Keygu_security_2022