pith. machine review for the scientific record. sign in

arxiv: 1201.2205 · v2 · submitted 2012-01-10 · 💻 cs.IT · cs.CR· math.IT

Recognition: unknown

A Cryptographic Treatment of the Wiretap Channel

Authors on Pith no claims yet
classification 💻 cs.IT cs.CRmath.IT
keywords securitychannelschemescommunitycryptographicmetrictargetwiretap
0
0 comments X
read the original abstract

The wiretap channel is a setting where one aims to provide information-theoretic privacy of communicated data based solely on the assumption that the channel from sender to adversary is "noisier" than the channel from sender to receiver. It has been the subject of decades of work in the information and coding (I&C) community. This paper bridges the gap between this body of work and modern cryptography with contributions along two fronts, namely metrics (definitions) of security, and schemes. We explain that the metric currently in use is weak and insufficient to guarantee security of applications and propose two replacements. One, that we call mis-security, is a mutual-information based metric in the I&C style. The other, semantic security, adapts to this setting a cryptographic metric that, in the cryptography community, has been vetted by decades of evaluation and endorsed as the target for standards and implementations. We show that they are equivalent (any scheme secure under one is secure under the other), thereby connecting two fundamentally different ways of defining security and providing a strong, unified and well-founded target for designs. Moving on to schemes, results from the wiretap community are mostly non-constructive, proving the existence of schemes without necessarily yielding ones that are explicit, let alone efficient, and only meeting their weak notion of security. We apply cryptographic methods based on extractors to produce explicit, polynomial-time and even practical encryption schemes that meet our new and stronger security target.

This paper has not been read by Pith yet.

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.

Forward citations

Cited by 3 Pith papers

Reviewed papers in the Pith corpus that reference this work. Sorted by Pith novelty score.

  1. Cryptographic and Information-theoretic Security Capacities for General Arbitrarily Varying Wiretap Channels

    cs.IT 2026-05 unverdicted novelty 7.0

    For AVWCs strong secrecy capacity equals semantic secrecy capacity; for GAVWCs the gap is bounded and vanishes if the jammer choice is sub-double-exponential in block length.

  2. Cryptographic and Information-theoretic Security Capacities for General Arbitrarily Varying Wiretap Channels

    cs.IT 2026-05 unverdicted novelty 6.0

    For AVWCs strong secrecy capacity equals semantic secrecy capacity; for GAVWCs the gap is bounded and vanishes when the jammer's choice is sub-double-exponential in block length.

  3. Finite-Length Empirical Comparison of Polar, PAC, and Invertible-Extractor Secrecy Codes over the Wiretap BSC

    cs.IT 2026-04 unverdicted novelty 6.0

    PAC codes match polar secrecy bounds while improving reliability and both provide tighter finite-length semantic secrecy than invertible-extractor schemes over the wiretap BSC.