Message Transmission with Reverse Firewalls—Secure Communication on Corrupted Machines

计算机科学 计算机网络 传输(电信) 计算机安全 电信
作者
Yevgeniy Dodis,Ilya Mironov,Noah Stephens-Davidowitz
出处
期刊:Lecture Notes in Computer Science 卷期号:: 341-372 被引量:47
标识
DOI:10.1007/978-3-662-53018-4_13
摘要

Suppose Alice wishes to send a message to Bob privately over an untrusted channel. Cryptographers have developed a whole suite of tools to accomplish this task, with a wide variety of notions of security, setup assumptions, and running times. However, almost all prior work on this topic made a seemingly innocent assumption: that Alice has access to a trusted computer with a proper implementation of the protocol. The Snowden revelations show us that, in fact, powerful adversaries can and will corrupt users' machines in order to compromise their security. And, presumably accidental vulnerabilities are regularly found in popular cryptographic software, showing that users cannot even trust implementations that were created honestly. This leads to the following seemingly absurd question: Can Alice securely send a message to Bob even if she cannot trust her own computer?! Bellare, Paterson, and Rogaway recently studied this question. They show a strong impossibility result that in particular rules out even semantically secure public-key encryption in their model. However, Mironov and Stephens-Davidowitz recently introduced a new framework for solving such problems: reverse firewalls. A secure reverse firewall is a third party that sits between Alice and the outside world and modifies her sent and received messages so that even if the her machine has been corrupted, Alice's security is still guaranteed. We show how to use reverse firewalls to sidestep the impossibility result of Bellare et al., and we achieve strong security guarantees in this extreme setting. Indeed, we find a rich structure of solutions that vary in efficiency, security, and setup assumptions, in close analogy with message transmission in the classical setting. Our strongest and most important result shows a protocol that achieves interactive, concurrent CCA-secure message transmission with a reverse firewall--i.e., CCA-secure message transmission on a possibly compromised machine! Surprisingly, this protocol is quite efficient and simple, requiring only four rounds and a small constant number of public-key operations for each party. It could easily be used in practice. Behind this result is a technical composition theorem that shows how key agreement with a sufficiently secure reverse firewall can be used to construct a message-transmission protocol with its own secure reverse firewall.

科研通智能强力驱动
Strongly Powered by AbleSci AI
科研通是完全免费的文献互助平台,具备全网最快的应助速度,最高的求助完成率。 对每一个文献求助,科研通都将尽心尽力,给求助人一个满意的交代。
实时播报
科研通AI6.2应助淑芬采纳,获得10
刚刚
可爱的音响完成签到,获得积分10
刚刚
一二三四完成签到 ,获得积分10
刚刚
西野完成签到,获得积分10
1秒前
和谐飞飞发布了新的文献求助10
1秒前
1秒前
科研通AI6.1应助dl采纳,获得10
1秒前
ricardo应助小黄车采纳,获得10
2秒前
765254958发布了新的文献求助10
2秒前
秋星人发布了新的文献求助10
3秒前
李顺利发布了新的文献求助10
3秒前
Mao发布了新的文献求助10
3秒前
ding应助酒醉的蝴蝶采纳,获得10
3秒前
赘婿应助酒醉的蝴蝶采纳,获得10
3秒前
zrz发布了新的文献求助10
3秒前
赘婿应助酒醉的蝴蝶采纳,获得10
3秒前
4秒前
cizzz发布了新的文献求助10
4秒前
4秒前
Lucas应助酒醉的蝴蝶采纳,获得10
4秒前
cici发布了新的文献求助10
4秒前
4秒前
共享精神应助酒醉的蝴蝶采纳,获得10
4秒前
慕青应助酒醉的蝴蝶采纳,获得10
4秒前
顾矜应助酒醉的蝴蝶采纳,获得10
4秒前
英姑应助chengxiaoli采纳,获得10
5秒前
5秒前
阿龙啊完成签到 ,获得积分10
5秒前
5秒前
Ava应助万物安生采纳,获得10
6秒前
Liao发布了新的文献求助30
6秒前
6秒前
6秒前
Nano发布了新的文献求助10
7秒前
科研通AI6.1应助sdsff采纳,获得10
7秒前
7秒前
ding应助wy18567337203采纳,获得10
8秒前
贤惠的伟泽完成签到,获得积分10
9秒前
10秒前
10秒前
高分求助中
(应助此贴封号)【重要!!请各用户(尤其是新用户)详细阅读】【科研通的精品贴汇总】 10000
Kinesiophobia : a new view of chronic pain behavior 2000
Research for Social Workers 1000
Mastering New Drug Applications: A Step-by-Step Guide (Mastering the FDA Approval Process Book 1) 800
The Social Psychology of Citizenship 600
Signals, Systems, and Signal Processing 510
Discrete-Time Signals and Systems 510
热门求助领域 (近24小时)
化学 材料科学 生物 医学 工程类 计算机科学 有机化学 物理 生物化学 纳米技术 复合材料 内科学 化学工程 人工智能 催化作用 遗传学 数学 基因 量子力学 物理化学
热门帖子
关注 科研通微信公众号,转发送积分 5911931
求助须知:如何正确求助?哪些是违规求助? 6829115
关于积分的说明 15783578
捐赠科研通 5036777
什么是DOI,文献DOI怎么找? 2711421
邀请新用户注册赠送积分活动 1661737
关于科研通互助平台的介绍 1603823