Message Transmission with Reverse Firewalls—Secure Communication on Corrupted Machines

计算机科学 计算机网络 传输(电信) 计算机安全 电信
作者
Yevgeniy Dodis,Ilya Mironov,Noah Stephens-Davidowitz
出处
期刊:Lecture Notes in Computer Science 卷期号:: 341-372 被引量:47
标识
DOI:10.1007/978-3-662-53018-4_13
摘要

Suppose Alice wishes to send a message to Bob privately over an untrusted channel. Cryptographers have developed a whole suite of tools to accomplish this task, with a wide variety of notions of security, setup assumptions, and running times. However, almost all prior work on this topic made a seemingly innocent assumption: that Alice has access to a trusted computer with a proper implementation of the protocol. The Snowden revelations show us that, in fact, powerful adversaries can and will corrupt users' machines in order to compromise their security. And, presumably accidental vulnerabilities are regularly found in popular cryptographic software, showing that users cannot even trust implementations that were created honestly. This leads to the following seemingly absurd question: Can Alice securely send a message to Bob even if she cannot trust her own computer?! Bellare, Paterson, and Rogaway recently studied this question. They show a strong impossibility result that in particular rules out even semantically secure public-key encryption in their model. However, Mironov and Stephens-Davidowitz recently introduced a new framework for solving such problems: reverse firewalls. A secure reverse firewall is a third party that sits between Alice and the outside world and modifies her sent and received messages so that even if the her machine has been corrupted, Alice's security is still guaranteed. We show how to use reverse firewalls to sidestep the impossibility result of Bellare et al., and we achieve strong security guarantees in this extreme setting. Indeed, we find a rich structure of solutions that vary in efficiency, security, and setup assumptions, in close analogy with message transmission in the classical setting. Our strongest and most important result shows a protocol that achieves interactive, concurrent CCA-secure message transmission with a reverse firewall--i.e., CCA-secure message transmission on a possibly compromised machine! Surprisingly, this protocol is quite efficient and simple, requiring only four rounds and a small constant number of public-key operations for each party. It could easily be used in practice. Behind this result is a technical composition theorem that shows how key agreement with a sufficiently secure reverse firewall can be used to construct a message-transmission protocol with its own secure reverse firewall.

科研通智能强力驱动
Strongly Powered by AbleSci AI
科研通是完全免费的文献互助平台,具备全网最快的应助速度,最高的求助完成率。 对每一个文献求助,科研通都将尽心尽力,给求助人一个满意的交代。
实时播报
刚刚
五六七完成签到,获得积分10
刚刚
刚刚
lll发布了新的文献求助10
1秒前
Xiaoxiao完成签到,获得积分10
1秒前
小白完成签到 ,获得积分10
1秒前
LINHAI完成签到,获得积分10
1秒前
xiaop发布了新的文献求助10
1秒前
XuZ发布了新的文献求助10
1秒前
1秒前
1秒前
香蕉觅云应助Lu采纳,获得10
1秒前
MW发布了新的文献求助10
1秒前
1秒前
NexusExplorer应助学术学习采纳,获得10
2秒前
禾风完成签到,获得积分10
2秒前
Anthony完成签到,获得积分10
2秒前
布吉岛发布了新的文献求助10
2秒前
阿强完成签到,获得积分10
3秒前
今后应助howl采纳,获得30
3秒前
大模型应助cs采纳,获得10
3秒前
脑洞疼应助susu采纳,获得10
3秒前
ww完成签到,获得积分10
3秒前
文文文完成签到,获得积分10
3秒前
bkagyin应助眯眯眼的以蕊采纳,获得10
3秒前
3秒前
long发布了新的文献求助10
4秒前
小马甲应助挣钱养刺猬采纳,获得10
4秒前
4秒前
香哥发布了新的文献求助10
4秒前
123完成签到,获得积分10
4秒前
yhzbmw完成签到,获得积分10
4秒前
圭青完成签到,获得积分10
5秒前
科研通AI6.2应助sharkmelon采纳,获得10
5秒前
南松完成签到,获得积分10
5秒前
YU发布了新的文献求助10
5秒前
王皮皮完成签到,获得积分10
5秒前
6秒前
6秒前
Roderick完成签到,获得积分10
6秒前
高分求助中
(应助此贴封号)【重要!!请各用户(尤其是新用户)详细阅读】【科研通的精品贴汇总】 10000
Aerospace Standards Index - 2026 ASIN2026 3000
Polymorphism and polytypism in crystals 1000
Signals, Systems, and Signal Processing 610
Discrete-Time Signals and Systems 610
Research Methods for Business: A Skill Building Approach, 9th Edition 500
Social Work and Social Welfare: An Invitation(7th Edition) 410
热门求助领域 (近24小时)
化学 材料科学 医学 生物 工程类 纳米技术 有机化学 物理 生物化学 化学工程 计算机科学 复合材料 内科学 催化作用 光电子学 物理化学 电极 冶金 遗传学 细胞生物学
热门帖子
关注 科研通微信公众号,转发送积分 6052358
求助须知:如何正确求助?哪些是违规求助? 7867065
关于积分的说明 16274487
捐赠科研通 5197889
什么是DOI,文献DOI怎么找? 2781169
邀请新用户注册赠送积分活动 1764112
关于科研通互助平台的介绍 1645942