• DocumentCode
    640346
  • Title

    The one-time pad revisited

  • Author

    Matt, Christian ; Maurer, Ueli

  • Author_Institution
    Dept. of Comput. Sci., ETH Zurich, Zurich, Switzerland
  • fYear
    2013
  • fDate
    7-12 July 2013
  • Firstpage
    2706
  • Lastpage
    2710
  • Abstract
    The one-time pad, the mother of all encryption schemes, is well known to be information-theoretically secure, in contrast to most encryption schemes used in practice, which are at most computationally secure. In this paper, we focus on another, completely different aspect in which the one-time pad is superior to normal encryption, and which surfaces only when the receiver (not only the eavesdropper) is considered potentially dishonest, as can be the case in a larger protocol context in which encryption is used as a sub-protocol. For example, such a dishonest receiver (who is, say, coerced by the eavesdropper) can in normal encryption verifiably leak the message to the eavesdropper by revealing the secret key. While this leakage feature can provably not be avoided completely, it is more limited if the one-time pad is used. We use the constructive cryptography framework to make these statements precise.
  • Keywords
    cryptographic protocols; information theory; constructive cryptography; encryption scheme; information theory; leakage feature; one-time pad; potentially dishonest receiver; protocol context; secret key; Computer science; Encryption; Information theory; Protocols; Receivers;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Information Theory Proceedings (ISIT), 2013 IEEE International Symposium on
  • Conference_Location
    Istanbul
  • ISSN
    2157-8095
  • Type

    conf

  • DOI
    10.1109/ISIT.2013.6620718
  • Filename
    6620718