Mosaics of combinatorial designs for information-theoretic security

02/01/2021
by   Moritz Wiese, et al.
0

We study security functions which can serve to establish semantic security for the two central problems of information-theoretic security: the wiretap channel, and privacy amplification in secret key generation. The security functions are functional forms of mosaics of combinatorial designs, more precisely, of group divisible designs and balanced incomplete block designs. Every member is associated with a unique color, and each color corresponds to a unique message or key value. Since the application of such security functions requires a public seed shared between the two trusted communicating parties, we want to minimize the seed set given by the common block index set of the designs in the mosaic. We give explicit examples which have an optimal or nearly optimal trade-off of seed length versus color (i.e., message or key) rate. We also derive bounds for the security performance of security functions given by functional forms of mosaics of designs.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
02/10/2022

Mosaics of Combinatorial Designs for Semantic Security on Quantum Wiretap Channels

We study semantic security for classical-quantum channels. Our security ...
research
02/03/2021

Information-theoretic Key Encapsulation and its Application to Secure Communication

A hybrid encryption scheme is a public key encryption system that consis...
research
05/10/2019

A One-Round Key Agreement Protocol with Information-Theoretic Security

Information-theoretic secure key agreement protocols do not use computat...
research
02/21/2022

On the Information-theoretic Security of Combinatorial All-or-nothing Transforms

All-or-nothing transforms (AONT) were proposed by Rivest as a message pr...
research
12/12/2020

Linear codes and incidence structures of bent functions and their generalizations

In this paper we consider further applications of (n,m)-functions for th...
research
12/27/2022

Information-theoretically secure equality-testing protocol with dispute resolution

There are often situations where two remote users each have data, and wi...
research
08/25/2020

Decentralized Custody Scheme with Game-Theoretic Security

Custody is a core financial service in which the custodian holds in safe...

Please sign up or login with your details

Forgot password? Click here to reset