Message Transmission with Reverse Firewalls—Secure Communication on Corrupted Machines

计算机科学 计算机网络 传输(电信) 计算机安全 电信
作者
Yevgeniy Dodis,Ilya Mironov,Noah Stephens-Davidowitz
出处
期刊:Lecture Notes in Computer Science 卷期号:: 341-372 被引量:47
标识
DOI:10.1007/978-3-662-53018-4_13
摘要

Suppose Alice wishes to send a message to Bob privately over an untrusted channel. Cryptographers have developed a whole suite of tools to accomplish this task, with a wide variety of notions of security, setup assumptions, and running times. However, almost all prior work on this topic made a seemingly innocent assumption: that Alice has access to a trusted computer with a proper implementation of the protocol. The Snowden revelations show us that, in fact, powerful adversaries can and will corrupt users' machines in order to compromise their security. And, presumably accidental vulnerabilities are regularly found in popular cryptographic software, showing that users cannot even trust implementations that were created honestly. This leads to the following seemingly absurd question: Can Alice securely send a message to Bob even if she cannot trust her own computer?! Bellare, Paterson, and Rogaway recently studied this question. They show a strong impossibility result that in particular rules out even semantically secure public-key encryption in their model. However, Mironov and Stephens-Davidowitz recently introduced a new framework for solving such problems: reverse firewalls. A secure reverse firewall is a third party that sits between Alice and the outside world and modifies her sent and received messages so that even if the her machine has been corrupted, Alice's security is still guaranteed. We show how to use reverse firewalls to sidestep the impossibility result of Bellare et al., and we achieve strong security guarantees in this extreme setting. Indeed, we find a rich structure of solutions that vary in efficiency, security, and setup assumptions, in close analogy with message transmission in the classical setting. Our strongest and most important result shows a protocol that achieves interactive, concurrent CCA-secure message transmission with a reverse firewall--i.e., CCA-secure message transmission on a possibly compromised machine! Surprisingly, this protocol is quite efficient and simple, requiring only four rounds and a small constant number of public-key operations for each party. It could easily be used in practice. Behind this result is a technical composition theorem that shows how key agreement with a sufficiently secure reverse firewall can be used to construct a message-transmission protocol with its own secure reverse firewall.
最长约 10秒,即可获得该文献文件

科研通智能强力驱动
Strongly Powered by AbleSci AI
更新
PDF的下载单位、IP信息已删除 (2025-6-4)

科研通是完全免费的文献互助平台,具备全网最快的应助速度,最高的求助完成率。 对每一个文献求助,科研通都将尽心尽力,给求助人一个满意的交代。
实时播报
友好凡霜发布了新的文献求助10
刚刚
赘婿应助大力的菠萝采纳,获得30
4秒前
5秒前
6秒前
8秒前
堕落叔叔完成签到,获得积分10
9秒前
yj17ying完成签到,获得积分10
9秒前
why发布了新的文献求助10
10秒前
郝薇薇薇薇儿完成签到,获得积分10
11秒前
11秒前
12秒前
啊Cu吖完成签到,获得积分10
14秒前
堕落叔叔发布了新的文献求助10
14秒前
小园饼干完成签到,获得积分10
14秒前
依依发布了新的文献求助10
15秒前
量子星尘发布了新的文献求助30
16秒前
你好完成签到,获得积分10
17秒前
17秒前
犹豫板油发布了新的文献求助30
18秒前
18秒前
yunchaozhang完成签到,获得积分10
24秒前
bkagyin应助LJJ采纳,获得10
26秒前
26秒前
SYLH应助Rannn采纳,获得10
28秒前
懵懂的南珍应助why采纳,获得30
28秒前
29秒前
29秒前
梅子完成签到 ,获得积分10
31秒前
风趣的之桃完成签到,获得积分10
32秒前
33秒前
科大学子完成签到 ,获得积分10
33秒前
空空完成签到,获得积分10
33秒前
英勇星月发布了新的文献求助10
35秒前
m艺完成签到 ,获得积分10
35秒前
35秒前
35秒前
SciGPT应助zyzy采纳,获得10
37秒前
科大学子关注了科研通微信公众号
38秒前
P1gy发布了新的文献求助100
38秒前
39秒前
高分求助中
The Mother of All Tableaux Order, Equivalence, and Geometry in the Large-scale Structure of Optimality Theory 2400
Ophthalmic Equipment Market by Devices(surgical: vitreorentinal,IOLs,OVDs,contact lens,RGP lens,backflush,diagnostic&monitoring:OCT,actorefractor,keratometer,tonometer,ophthalmoscpe,OVD), End User,Buying Criteria-Global Forecast to2029 2000
A new approach to the extrapolation of accelerated life test data 1000
Cognitive Neuroscience: The Biology of the Mind 1000
Cognitive Neuroscience: The Biology of the Mind (Sixth Edition) 1000
Optimal Transport: A Comprehensive Introduction to Modeling, Analysis, Simulation, Applications 800
Official Methods of Analysis of AOAC INTERNATIONAL 600
热门求助领域 (近24小时)
化学 材料科学 医学 生物 工程类 有机化学 生物化学 物理 内科学 纳米技术 计算机科学 化学工程 复合材料 遗传学 基因 物理化学 催化作用 冶金 细胞生物学 免疫学
热门帖子
关注 科研通微信公众号,转发送积分 3959455
求助须知:如何正确求助?哪些是违规求助? 3505634
关于积分的说明 11125092
捐赠科研通 3237449
什么是DOI,文献DOI怎么找? 1789148
邀请新用户注册赠送积分活动 871583
科研通“疑难数据库(出版商)”最低求助积分说明 802858