The security of chaffing and winnowing

21Citations
Citations of this article
57Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

This paper takes a closer look at Rivest’s chaffing-and-winnowing paradigm for data privacy.We begin with a definition which enables one to clearly determine whether a given scheme qualifies as “chaffing-and-winnowing.” We then analyze Rivest’s schemes to see what quality of data privacy they provide. His bit-by-bit scheme is easily proven secure but is inefficient. His more efficient scheme —based on all-or-nothing transforms (AONTs)—can be attacked under Rivest’s definition of security of an AONT, and even under stronger notions does not appear provable. However we show that by using OAEP as the AONT one can prove security, and also present a different scheme, still using AONTs, that is equally efficient and easily proven secure even under a relatively weak notion of security of AONTs.

Cite

CITATION STYLE

APA

Bellare, M., & Boldyreva, A. (2000). The security of chaffing and winnowing. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 1976, pp. 517–530). Springer Verlag. https://doi.org/10.1007/3-540-44448-3_40

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free