Recognition: unknown
A Cryptographic Treatment of the Wiretap Channel
read the original abstract
The wiretap channel is a setting where one aims to provide information-theoretic privacy of communicated data based solely on the assumption that the channel from sender to adversary is "noisier" than the channel from sender to receiver. It has been the subject of decades of work in the information and coding (I&C) community. This paper bridges the gap between this body of work and modern cryptography with contributions along two fronts, namely metrics (definitions) of security, and schemes. We explain that the metric currently in use is weak and insufficient to guarantee security of applications and propose two replacements. One, that we call mis-security, is a mutual-information based metric in the I&C style. The other, semantic security, adapts to this setting a cryptographic metric that, in the cryptography community, has been vetted by decades of evaluation and endorsed as the target for standards and implementations. We show that they are equivalent (any scheme secure under one is secure under the other), thereby connecting two fundamentally different ways of defining security and providing a strong, unified and well-founded target for designs. Moving on to schemes, results from the wiretap community are mostly non-constructive, proving the existence of schemes without necessarily yielding ones that are explicit, let alone efficient, and only meeting their weak notion of security. We apply cryptographic methods based on extractors to produce explicit, polynomial-time and even practical encryption schemes that meet our new and stronger security target.
This paper has not been read by Pith yet.
Forward citations
Cited by 3 Pith papers
-
Cryptographic and Information-theoretic Security Capacities for General Arbitrarily Varying Wiretap Channels
For AVWCs strong secrecy capacity equals semantic secrecy capacity; for GAVWCs the gap is bounded and vanishes if the jammer choice is sub-double-exponential in block length.
-
Cryptographic and Information-theoretic Security Capacities for General Arbitrarily Varying Wiretap Channels
For AVWCs strong secrecy capacity equals semantic secrecy capacity; for GAVWCs the gap is bounded and vanishes when the jammer's choice is sub-double-exponential in block length.
-
Finite-Length Empirical Comparison of Polar, PAC, and Invertible-Extractor Secrecy Codes over the Wiretap BSC
PAC codes match polar secrecy bounds while improving reliability and both provide tighter finite-length semantic secrecy than invertible-extractor schemes over the wiretap BSC.
discussion (0)
Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.