pith. machine review for the scientific record. sign in

arxiv: 1201.3160 · v2 · submitted 2012-01-16 · 💻 cs.IT · cs.CR· math.IT

Recognition: unknown

Polynomial-Time, Semantically-Secure Encryption Achieving the Secrecy Capacity

Authors on Pith no claims yet
classification 💻 cs.IT cs.CRmath.IT
keywords schemesecurityrateachievingbeencapacitychannelencryption
0
0 comments X
read the original abstract

In the wiretap channel setting, one aims to get information-theoretic privacy of communicated data based only on the assumption that the channel from sender to receiver is noisier than the one from sender to adversary. The secrecy capacity is the optimal (highest possible) rate of a secure scheme, and the existence of schemes achieving it has been shown. For thirty years the ultimate and unreached goal has been to achieve this optimal rate with a scheme that is polynomial-time. (This means both encryption and decryption are proven polynomial time algorithms.) This paper finally delivers such a scheme. In fact it does more. Our scheme not only meets the classical notion of security from the wiretap literature, called MIS-R (mutual information security for random messages) but achieves the strictly stronger notion of semantic security, thus delivering more in terms of security without loss of rate.

This paper has not been read by Pith yet.

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.

Forward citations

Cited by 1 Pith paper

Reviewed papers in the Pith corpus that reference this work. Sorted by Pith novelty score.

  1. Finite-Length Empirical Comparison of Polar, PAC, and Invertible-Extractor Secrecy Codes over the Wiretap BSC

    cs.IT 2026-04 unverdicted novelty 6.0

    PAC codes match polar secrecy bounds while improving reliability and both provide tighter finite-length semantic secrecy than invertible-extractor schemes over the wiretap BSC.