|
For Full-Text PDF, please login, if you are a member of IEICE,
or go to Pay Per View on menu list, if you are a nonmember of IEICE.
|
Public-Key Encryption with Lazy Parties
Kenji YASUNAGA
Publication
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Vol.E99-A
No.2
pp.590-600 Publication Date: 2016/02/01 Online ISSN: 1745-1337
DOI: 10.1587/transfun.E99.A.590 Type of Manuscript: PAPER Category: Cryptography and Information Security Keyword: public-key encryption, rational cryptography, lazy party,
Full Text: PDF(401.9KB)>>
Summary:
In a public-key encryption scheme, if a sender is not concerned about the security of a message and is unwilling to generate costly randomness, the security of the encrypted message can be compromised. In this work, we characterize such lazy parties, who are regarded as honest parties, but are unwilling to perform a costly task when they are not concerned about the security. Specifically, we consider a rather simple setting in which the costly task is to generate randomness used in algorithms, and parties can choose either perfect randomness or a fixed string. We model lazy parties as rational players who behave rationally to maximize their utilities, and define a security game between the parties and an adversary. Since a standard secure encryption scheme does not work in this setting, we provide constructions of secure encryption schemes in various settings.
|
|