Abstract
Remotely keyed encryption schemes (RKESs), introduced by Blaze [6], support high-band width cryptographic applications (such as encrypted video conferences) in which long-lived secrets (such as users' private keys) never leave lower-bandwidth environments such as secure smart-cards. We provide a formal framework in which to study the security of RKESs and give an RKES that satisfies our formal security requirements. Our RKES is efficient in that the amount of communication and computation required of the smart-card is independent of the input size. Our proof of security uses the pseudorandom permutation framework of Naor and Reingold [14] in an essential way.
A preliminary version of the full paper is available from the authors. The third author was supported by a RAND2 grant from the EC.
Chapter PDF
References
M. Bellare, A. Desai, E. Jokipii, and P. Rogaway, “A Concrete Security Treatment of Symmetric Encryption,” in Proceedings of the 38th Symposium on Foundation of Computer Science, IEEE Computer Society Press, Los Alamitos, pp. 394–403, 1997.
M. Bellare, J. Kilian, and P. Rogaway, “The Security of Cipher Block Chaining,” in Advances in Cryptology — Crypto '94, Lecture Notes in Computer Science, vol. 839, Springer, Berlin, pp. 341–358, 1994.
M. Bellare and P. Rogaway, “Provably Secure Session Key Distribution — The Three Party Case,” in Proceedings of the 27th Symposium on Theory of Computing, ACM, New York, pp. 57–66, 1995.
M. Bellare and P. Rogaway, “Collision Resistant Hashing, Towards Making UOWHFs practical,” in Advances in Cryptology — Crypto '97, Lecture Notes in Computer Science, vol. 1294, Springer, Berlin, pp. 470–484, 1997.
E. Biham and A. Shamir, “Differential Fault Analysis of Secret Key Cryptosystems,” in Advances in Cryptology — Crypto '97, Lecture Notes in Computer Science, vol. 1294, Springer, Berlin, pp. 513–525, 1997.
M. Blaze, “High-Bandwidth Encryption with Low-Bandwidth Smartcards,” in Proceedings of the Fast Software Encryption Workshop, Lecture Notes in Computer Science, vol. 1039, Springer, Berlin, pp. 33–40, 1996.
D. Boneh, R. A. Demillo, and R. J. Lipton, “On the Importance of Checking Protocols for Faults,” in Advances in Cryptology — Eurocrypt '97, Lecture Notes in Computer Science vol. 1233, Springer, Berlin, pp. 37–51, 1997.
J. Feigenbaum, “Locally Random Reductions in Interactive Complexity Theory,” in Advances in Computational Complexity Theory, DIMACS Series on Discrete Mathematics and Theoretical Computer Science, vol. 13, American Mathematical Society, Providence, 1993, pp. 73–98.
O. Goldreich, Foundations of Cryptography (Fragments of a Book), 1995. http://www.eccc.uni-trier.de/eccc/info/ECCC-Books/eccc-books.html
O. Goldreich S. Goldwasser, and S. Micali, “How to Construct Random Functions,” J. of the ACM, 33 (1986), pp. 792–807.
M. Luby, Pseudorandomness and Cryptographic Applications, Princeton University Press, Princeton, 1996.
S. Lucks, “On the Security of Remotely Keyed Encryption,” in Proceedings of the Fast Software Encryption Workshop, Lecture Notes in Computer Science, vol. 1267, Springer, Berlin, pp. 219–229, 1997.
T. Matsumoto, K. Kato, and H. Imai, “Speeding Up Secret Computations with Insecure Auxiliary Devices,” in Advances in Cryptology — Crypto '88, Lecture Notes in Computer Science, vol. 403, Springer, Berlin, pp. 497–506, 1990.
M. Naor and O. Reingold, “On the Construction of Pseudo-Random Permutations: Luby-Rackoff Revisited,” to appear in J. Cryptology. Extended abstract appears in Proceedings of the 29th Symposium on Theory of Computing, ACM, New York, pp. 189–199, 1997.
V. Shoup and A. Rubin, “Session Key Distribution Using Smart Cards,” in Advances in Cryptology — Eurocrypt '96, Lecture Notes in Computer Science vol. 1070, Springer, Berlin, pp. 321–331, 1996.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1998 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Blaze, M., Feigenbaum, J., Naor, M. (1998). A formal treatment of remotely keyed encryption. In: Nyberg, K. (eds) Advances in Cryptology — EUROCRYPT'98. EUROCRYPT 1998. Lecture Notes in Computer Science, vol 1403. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0054131
Download citation
DOI: https://doi.org/10.1007/BFb0054131
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-64518-4
Online ISBN: 978-3-540-69795-4
eBook Packages: Springer Book Archive