IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Online ISSN : 1745-1337
Print ISSN : 0916-8508
Regular Section
Information-Theoretic Secrecy with Access to Decryption Oracles
Christopher PORTMANNKeisuke TANAKA
Author information
JOURNAL RESTRICTED ACCESS

2011 Volume E94.A Issue 7 Pages 1585-1590

Details
Abstract

We analyze the security notion of information-theoretic secrecy against an adversary who can make l adaptive queries to the decryption oracle, and show that it is equivalent to requiring that the encryption scheme can perfectly encrypt l+1 different messages. This immediately yields a lower bound on the key length and an optimal construction, namely (l+1)-wise independent permutations. This also gives an operational interpretation to the notion of decryption oracles in information-theoretic security.

Content from these authors
© 2011 The Institute of Electronics, Information and Communication Engineers
Previous article Next article
feedback
Top