On tolerant cryptographic constructions

Amir Herzberg

Research output: Contribution to journalConference articlepeer-review

33 Scopus citations

Abstract

Cryptographic schemes are often constructed using multiple component cryptographic modules. A construction is tolerant for a (security) specification if it meets the specification, provided a majority (or other threshold) of the components meet their specifications. We define tolerant constructions, and investigate 'folklore', practical cascade and parallel constructions. In particular, we show that cascading encryption schemes provides tolerance under chosen plaintext attack, non-adaptive chosen ciphertext attack (CCA1) and a weak form of adaptive chosne ciphertext attack (weak CCA2), but not under the 'standard' CCA2 attack. Similarly, certain parallel constructions ensure tolerance for unforgeability of Signature/MAC schemes, OWF, ERF, AONT and certain collision-resistant hash functions. We present (new) tolerant constructions for (several variants of) commitment schemes, by composing simple constructions, and general method of composing tolerant constructions. Our constructions are simple, efficient and practical. To ensure practicality, we use concrete security analysis (in addition to the simpler asymptotic analysis).

Original languageEnglish
Pages (from-to)172-190
Number of pages19
JournalLecture Notes in Computer Science
Volume3376
DOIs
StatePublished - 2005
EventRSA Conference 2005 - San Francisco, CA, United States
Duration: 14 Feb 200518 Feb 2005

Fingerprint

Dive into the research topics of 'On tolerant cryptographic constructions'. Together they form a unique fingerprint.

Cite this