Secure Length-Preserving All-or-Nothing Transform (特集 多様な社会的責任を担うコンピュータセキュリティ技術)
スポンサーリンク
概要
- 論文の詳細を見る
When a hard drive (HDD) is recycled, it is recommended that all files on the HDD are repeatedly overwritten with random strings for protecting their confidentiality. However, it takes a long time to overwrite them. This problem is solved by applying the all-or-nothing transform (AONT) to the filesystem of the HDD. To use the HDD economically, it is desirable to use a length-preserving AONT (LP-AONT). Whereas previous AONTs cause the increase of size of a file, and no LP-AONT is secure under previous security definitions. However, it does not mean that the LP-AONT is useless; previous security definitions are too strict in practical applications. Then, by introducing the ambiguity of a message, we propose more practical security definitions of the AONT. We also show the secure implementation of the LP-AONT under the proposed security definitions. The analysis shows that our implementation is nearly optimal in terms of the success probability of an adversary. It means that the ambiguity of one message block allows us to construct the LP-AONT as secure as previous AONTs.
- 一般社団法人情報処理学会の論文
- 2005-08-15
著者
関連論文
- Reversible Watermark with Large Capacity Based on the Prediction Error Expansion
- Fingerprinting Protocol Based on Distributed Providers Using Oblivious Transfer(Cryptography,Information Theory and Its Applications)
- Reversible Watermark with Large Capacity Based on the Prediction Error
- Collusion-Attack Free ID-Based Non-interactive Key Sharing(Information Security)
- Threshold Ring Signature Scheme Based on the Curve (特集:新たな脅威に立ち向かうコンピュータセキュリティ技術)
- Indifferentiability of Single-Block-Length and Rate-1 Compression Functions
- Fingerprinting Protocol for On-Line Trade Using Information Gap between Buyer and Merchant
- Secure Length-Preserving All-or-Nothing Transform (特集 多様な社会的責任を担うコンピュータセキュリティ技術)
- Visual Commitment Using the Trusted Initializer
- Secure Length-Preserving All-or-Nothing Transform
- Secure Length-Preserving All-or-Nothing Transform
- Length-preserving CBC Enciphering Scheme and Its Security Analysis
- Length-preserving CBC Enciphering Scheme and Its Security Analysis