Secure list decoding and its application to bit-string commitment

03/22/2021
by   Masahito Hayashi, et al.
0

We propose a new concept of secure list decoding, which is related to bit-string commitment. While the conventional list decoding requires that the list contains the transmitted message, secure list decoding requires the following additional security conditions to work as a modification of bit-string commitment. The first additional security condition is the receiver's uncertainty for the transmitted message, which is stronger than the impossibility of the correct decoding, even though the transmitted message is contained in the list. The other additional security condition is the impossibility for the sender to estimate another element of the decoded list except for the transmitted message. The first condition is evaluated by the equivocation rate. The asymptotic property is evaluated by three parameters, the rates of the message and list sizes, and the equivocation rate. We derive the capacity region of this problem. We show that the combination of hash function and secure list decoding yields the conventional bit-string commitment. Our results hold even when the input and output systems are general probability spaces including continuous systems. When the input system is a general probability space, we formulate the abilities of the honest sender and the dishonest sender in a different way.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
01/09/2019

Secure list decoding

In this paper, we propose a new concept of secure list decoding. While t...
research
01/09/2020

List Decoding for Oblivious Arbitrarily Varying MACs: Constrained and Gaussian

This paper provides upper and lower bounds on list sizes of list decodin...
research
06/30/2023

Performance Analysis for Polar Codes under Successive Cancellation List Decoding with Fixed List Size

In this paper, we first indicate that the block error event of polar cod...
research
06/28/2022

ABC for model selection and parameter estimation of drill-string bit-rock interaction models and stochastic stability

The bit-rock interaction considerably affects the dynamics of a drill st...
research
11/16/2022

The Levenshtein's Sequence Reconstruction Problem and the Length of the List

In the paper, the Levenshtein's sequence reconstruction problem is consi...
research
01/31/2020

A Private Quantum Bit String Commitment

We propose an entanglement-based quantum bit string commitment protocol ...
research
02/26/2020

Is the OWASP Top 10 list comprehensive enough for writing secure code?

The OWASP Top 10 is a list that is published by the Open Web Application...

Please sign up or login with your details

Forgot password? Click here to reset