Cryptology ePrint Archive: Report 2014/746

Decoy-based information security

Vladimir Shpilrain

Abstract: In this survey, we discuss an emerging concept of decoy-based information security, or security without computational assumptions. In particular, we show how this concept can be implemented to provide security against (passive) computationally unbounded adversary in some public-key encryption protocols. In the world of symmetric cryptography, decoy-based security finds a wide range of applications, notably to secure delegation of computation to another party. We single out the scenario where a computationally limited party wants to send an encrypted message to a computationally superior party using the RSA protocol, thereby providing another kind of application of decoy ideas in a public-key setting. With typical RSA parameters, decoy-based method of delegation of computation improves the efficiency for the sender by several orders of magnitude.

Category / Keywords: public-key cryptography / public-key cryptography, delegation of computation, decoy, RSA

Date: received 25 Sep 2014

Contact author: shpil at groups sci ccny cuny edu

Available format(s): PDF | BibTeX Citation

Version: 20140926:083934 (All versions of this report)

Short URL:

Discussion forum: Show discussion | Start new discussion

[ Cryptology ePrint archive ]