2000 character limit reached
Security for adversarial wiretap channels (2404.01760v1)
Published 2 Apr 2024 in cs.CR, cs.IT, and math.IT
Abstract: We consider the wiretap channel, where the individual channel uses have memory or are influenced by an adversary. We analyze the explicit and computationally efficient construction of information-theoretically secure coding schemes which use the inverse of an extractor and an error-correcting code. These schemes are known to achieve secrecy capacity on a large class of memoryless wiretap channels. We show that this also holds for certain channel types with memory. In particular, they can achieve secrecy capacity on channels where an adversary can pick a sequence of ``states'' governing the channel's behavior, as long as, given every possible state, the channel is strongly symmetric.
- Canetti, R.: Universally composable security: a new paradigm for cryptographic protocols. In: FOCS ’01: Proceedings of the Symposium on Foundations of Computer Science. pp. 136–145 (2001). https://doi.org/10.1109/SFCS.2001.959888
- Loeliger, H.A.: Algebra and error correcting codes (2022)
- Maurer, U.: Indistinguishability of random systems. In: EUROCRYPT ’02: Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques. pp. 110–132 (2002). https://doi.org/10.1007/3-540-46035-7_8