Security for adversarial wiretap channels
Abstract: We consider the wiretap channel, where the individual channel uses have memory or are influenced by an adversary. We analyze the explicit and computationally efficient construction of information-theoretically secure coding schemes which use the inverse of an extractor and an error-correcting code. These schemes are known to achieve secrecy capacity on a large class of memoryless wiretap channels. We show that this also holds for certain channel types with memory. In particular, they can achieve secrecy capacity on channels where an adversary can pick a sequence of ``states'' governing the channel's behavior, as long as, given every possible state, the channel is strongly symmetric.
- Canetti, R.: Universally composable security: a new paradigm for cryptographic protocols. In: FOCS ’01: Proceedings of the Symposium on Foundations of Computer Science. pp. 136–145 (2001). https://doi.org/10.1109/SFCS.2001.959888
- Loeliger, H.A.: Algebra and error correcting codes (2022)
- Maurer, U.: Indistinguishability of random systems. In: EUROCRYPT ’02: Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques. pp. 110–132 (2002). https://doi.org/10.1007/3-540-46035-7_8
Paper Prompts
Sign up for free to create and run prompts on this paper using GPT-5.
Top Community Prompts
Collections
Sign up for free to add this paper to one or more collections.