Anamorphic Signatures: Secrecy from a Dictator Who Only Permits Authentication!

التفاصيل البيبلوغرافية
العنوان: Anamorphic Signatures: Secrecy from a Dictator Who Only Permits Authentication!
المؤلفون: Kutyłowski, Mirosław, Persiano, Giuseppe, Phan, Duong Hieu, Yung, Moti, Zawada, Marcin
المساهمون: Wroclaw University of Science and Technology, Università degli Studi di Salerno = University of Salerno (UNISA), Cybersécurité et Cryptographie (C2), Laboratoire Traitement et Communication de l'Information (LTCI), Institut Mines-Télécom Paris (IMT)-Télécom Paris-Institut Mines-Télécom Paris (IMT)-Télécom Paris, Département Informatique et Réseaux (INFRES), Télécom ParisTech, Institut Mines-Télécom Paris (IMT)-Télécom Paris, Google Inc, Research at Google
المصدر: Advances in Cryptology – CRYPTO 2023 ; https://hal.science/hal-04194141 ; Advances in Cryptology – CRYPTO 2023, Aug 2023, Santa Barbara (CA), United States. pp.759-790, ⟨10.1007/978-3-031-38545-2_25⟩
بيانات النشر: HAL CCSD
Springer Nature Switzerland
سنة النشر: 2023
مصطلحات موضوعية: [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
جغرافية الموضوع: Santa Barbara (CA), United States
الوصف: The goal of this research is to raise technical doubts regarding the usefulness of the repeated attempts by governments to curb Cryptography (aka the "Crypto Wars"), and argue that they, in fact, cause more damage than adding effective control. The notion of Anamorphic Encryption was presented in Eurocrypt'22 for a similar aim. There, despite the presence of a Dictator who possesses all keys and knows all messages, parties can arrange a hidden "anamorphic" message in an otherwise indistinguishable from regular ciphertexts (wrt the Dictator). In this work, we postulate a stronger cryptographic control setting where encryption does not exist (or is neutralized) since all communication is passed through the Dictator in, essentially, cleartext mode (or otherwise, when secure channels to and from the Dictator are the only confidentiality mechanism). Messages are only authenticated to assure recipients of the identity of the sender. We ask whether security against the Dictator still exists, even under such a strict regime which allows only authentication (i.e., authenticated/ signed messages) to pass end-toend, and where received messages are determined by/ known to the Dictator, and the Dictator also eventually gets all keys to verify compliance of past signing. To frustrate the Dictator, this authenticated message setting gives rise to the possible notion of anamorphic channels inside signature and authentication schemes, where parties attempt to send undetectable secure messages (or other values) using signature tags which are indistinguishable from regular tags. We define and present implementation of schemes for anamorphic signature and authentication; these are applicable to existing and standardized signature and authentication schemes which were designed independently of the notion of anamorphic messages. Further, some cornerstone constructions of the foundations of signatures, in fact, introduce anamorphism.
نوع الوثيقة: conference object
اللغة: English
Relation: hal-04194141; https://hal.science/hal-04194141; https://hal.science/hal-04194141/document; https://hal.science/hal-04194141/file/2023-356.pdf
DOI: 10.1007/978-3-031-38545-2_25
الاتاحة: https://hal.science/hal-04194141
https://hal.science/hal-04194141/document
https://hal.science/hal-04194141/file/2023-356.pdf
https://doi.org/10.1007/978-3-031-38545-2_25
Rights: info:eu-repo/semantics/OpenAccess
رقم الانضمام: edsbas.B4FD5011
قاعدة البيانات: BASE
الوصف
DOI:10.1007/978-3-031-38545-2_25