On tolerant cryptographic constructions

  • Amir Herzberg

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

33 Scopus citations

Abstract

Cryptographic schemes are often constructed using multiple component cryptographic modules. A construction is tolerant for a (security) specification if it meets the specification, provided a majority (or other threshold) of the components meet their specifications. We define tolerant constructions, and investigate 'folklore', practical cascade and parallel constructions. In particular, we show that cascading encryption schemes provides tolerance under chosen plaintext attack, non-adaptive chosen ciphertext attack (CCA1) and a weak form of adaptive chosne ciphertext attack (weak CCA2), but not under the 'standard' CCA2 attack. Similarly, certain parallel constructions ensure tolerance for unforgeability of Signature/MAC schemes, OWF, ERF, AONT and certain collision-resistant hash functions. We present (new) tolerant constructions for (several variants of) commitment schemes, by composing simple constructions, and general method of composing tolerant constructions. Our constructions are simple, efficient and practical. To ensure practicality, we use concrete security analysis (in addition to the simpler asymptotic analysis).

Original languageEnglish
Title of host publicationTopics in Cryptology - CT-RSA 2005 - The Cryptographers' Track at the RSA Conference 2005
PublisherSpringer Verlag
Pages172-190
Number of pages19
ISBN (Print)3540243992
DOIs
StatePublished - 2005
EventCryptographers’ Track at the RSA Conference, CT-RSA 2005 - San Francisco, CA, United States
Duration: 14 Feb 200518 Feb 2005

Publication series

NameLecture Notes in Computer Science
Volume3376
ISSN (Print)0302-9743

Conference

ConferenceCryptographers’ Track at the RSA Conference, CT-RSA 2005
Country/TerritoryUnited States
CitySan Francisco, CA
Period14/02/0518/02/05

Fingerprint

Dive into the research topics of 'On tolerant cryptographic constructions'. Together they form a unique fingerprint.

Cite this