Message Transmission with Reverse Firewalls—Secure Communication on Corrupted Machines

计算机科学 计算机网络 传输(电信) 计算机安全 电信
作者
Yevgeniy Dodis,Ilya Mironov,Noah Stephens-Davidowitz
出处
期刊:Lecture Notes in Computer Science 卷期号:: 341-372 被引量:47
标识
DOI:10.1007/978-3-662-53018-4_13
摘要

Suppose Alice wishes to send a message to Bob privately over an untrusted channel. Cryptographers have developed a whole suite of tools to accomplish this task, with a wide variety of notions of security, setup assumptions, and running times. However, almost all prior work on this topic made a seemingly innocent assumption: that Alice has access to a trusted computer with a proper implementation of the protocol. The Snowden revelations show us that, in fact, powerful adversaries can and will corrupt users' machines in order to compromise their security. And, presumably accidental vulnerabilities are regularly found in popular cryptographic software, showing that users cannot even trust implementations that were created honestly. This leads to the following seemingly absurd question: Can Alice securely send a message to Bob even if she cannot trust her own computer?! Bellare, Paterson, and Rogaway recently studied this question. They show a strong impossibility result that in particular rules out even semantically secure public-key encryption in their model. However, Mironov and Stephens-Davidowitz recently introduced a new framework for solving such problems: reverse firewalls. A secure reverse firewall is a third party that sits between Alice and the outside world and modifies her sent and received messages so that even if the her machine has been corrupted, Alice's security is still guaranteed. We show how to use reverse firewalls to sidestep the impossibility result of Bellare et al., and we achieve strong security guarantees in this extreme setting. Indeed, we find a rich structure of solutions that vary in efficiency, security, and setup assumptions, in close analogy with message transmission in the classical setting. Our strongest and most important result shows a protocol that achieves interactive, concurrent CCA-secure message transmission with a reverse firewall--i.e., CCA-secure message transmission on a possibly compromised machine! Surprisingly, this protocol is quite efficient and simple, requiring only four rounds and a small constant number of public-key operations for each party. It could easily be used in practice. Behind this result is a technical composition theorem that shows how key agreement with a sufficiently secure reverse firewall can be used to construct a message-transmission protocol with its own secure reverse firewall.

科研通智能强力驱动
Strongly Powered by AbleSci AI
科研通是完全免费的文献互助平台,具备全网最快的应助速度,最高的求助完成率。 对每一个文献求助,科研通都将尽心尽力,给求助人一个满意的交代。
实时播报
科研通AI6.3应助ethereal采纳,获得10
刚刚
Wa完成签到,获得积分10
1秒前
凶狠的冥发布了新的文献求助10
1秒前
yang发布了新的文献求助10
1秒前
1秒前
叶远望完成签到 ,获得积分10
3秒前
努力哦发布了新的文献求助10
3秒前
pei完成签到,获得积分10
3秒前
4秒前
4秒前
6秒前
hh发布了新的文献求助10
6秒前
Zo完成签到,获得积分10
6秒前
17发布了新的文献求助10
7秒前
仔仔完成签到 ,获得积分10
9秒前
咕噜噜完成签到 ,获得积分10
9秒前
10秒前
10秒前
醋灯笼发布了新的文献求助10
11秒前
11秒前
不知名人士完成签到 ,获得积分10
11秒前
小壳儿完成签到 ,获得积分10
13秒前
LiuXinping完成签到,获得积分10
13秒前
睡好觉吃好饭完成签到,获得积分10
13秒前
LIB完成签到,获得积分10
14秒前
14秒前
怕黑灭龙完成签到,获得积分10
15秒前
活泼大侠发布了新的文献求助10
17秒前
TaiLongYang完成签到,获得积分10
18秒前
loverdose完成签到,获得积分10
18秒前
呆萌听兰发布了新的文献求助10
19秒前
19秒前
科研通AI6.2应助研酒生采纳,获得10
20秒前
20秒前
科研通AI6.2应助WY采纳,获得10
20秒前
实验一定顺完成签到,获得积分10
21秒前
zwq完成签到,获得积分10
21秒前
深情安青应助爸爸的伞采纳,获得10
22秒前
22秒前
22秒前
高分求助中
(应助此贴封号)【重要!!请各用户(尤其是新用户)详细阅读】【科研通的精品贴汇总】 10000
Modern Epidemiology, Fourth Edition 5000
Digital Twins of Advanced Materials Processing 2000
Weaponeering, Fourth Edition – Two Volume SET 2000
Polymorphism and polytypism in crystals 1000
Signals, Systems, and Signal Processing 610
Discrete-Time Signals and Systems 610
热门求助领域 (近24小时)
化学 材料科学 医学 生物 工程类 纳米技术 有机化学 物理 生物化学 化学工程 计算机科学 复合材料 内科学 催化作用 光电子学 物理化学 电极 冶金 遗传学 细胞生物学
热门帖子
关注 科研通微信公众号,转发送积分 6023452
求助须知:如何正确求助?哪些是违规求助? 7650975
关于积分的说明 16173207
捐赠科研通 5171995
什么是DOI,文献DOI怎么找? 2767346
邀请新用户注册赠送积分活动 1750690
关于科研通互助平台的介绍 1637238