Paper 2014/746
Decoy-based information security
Vladimir Shpilrain
Abstract
In this survey, we discuss an emerging concept of decoy-based information security, or security without computational assumptions. In particular, we show how this concept can be implemented to provide security against (passive) computationally unbounded adversary in some public-key encryption protocols. In the world of symmetric cryptography, decoy-based security finds a wide range of applications, notably to secure delegation of computation to another party. We single out the scenario where a computationally limited party wants to send an encrypted message to a computationally superior party using the RSA protocol, thereby providing another kind of application of decoy ideas in a public-key setting. With typical RSA parameters, decoy-based method of delegation of computation improves the efficiency for the sender by several orders of magnitude.
Metadata
- Available format(s)
- Category
- Public-key cryptography
- Publication info
- Preprint. MINOR revision.
- Keywords
- public-key cryptographydelegation of computationdecoyRSA
- Contact author(s)
- shpil @ groups sci ccny cuny edu
- History
- 2014-09-26: received
- Short URL
- https://ia.cr/2014/746
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2014/746, author = {Vladimir Shpilrain}, title = {Decoy-based information security}, howpublished = {Cryptology {ePrint} Archive, Paper 2014/746}, year = {2014}, url = {https://eprint.iacr.org/2014/746} }