Semantic Security on Wiretap Channels using Universal Hashing with Fading Applications

03/21/2019
by   Eric Kubischta, et al.
0

We furnish a procedure based on universal hash families (UHFs) that can convert an error correcting coding scheme (ECC) of rate R into a semantically secure wiretap coding scheme of rate R - ξ where ξ is a parameter derived from the eavesdropper's point-to-point channel. This conversion is shown to be polynomial time efficient with block length and is applicable to any channel. When an ECC is chosen, our procedure induces a wiretap coding scheme that is concrete and efficient as long as the ECC is also such. To prove this induced wiretap coding scheme is semantically secure, we have constructed bounds on the information leaked to the eavesdropper. Our construction is an upgrade of bounds from recent literature: the novelty here being that our leakage bounds hold for any message distribution. Indeed, our wiretap procedure using UHFs and our characterization of its semantic leakage is the first main contribution of this work. The other main contribution of this work is as follows. We apply the aforementioned procedure to a variety of wiretap channels in order to show the procedure's efficacy, and as a result of such applications, our results establish new achievable semantically secure rates.

READ FULL TEXT
research
11/19/2018

Semantic Security and the Second-Largest Eigenvalue of Biregular Graphs

It is investigated how to achieve semantic security for the wiretap chan...
research
05/10/2023

Secure Block Joint Source-Channel Coding with Sequential Encoding

We extend the results of Ghourchian et al. [IEEE JSAIT-2021], to joint s...
research
11/14/2022

A Lego-Brick Approach to Coding for Network Communication

Coding schemes for several problems in network information theory are co...
research
06/02/2022

Universal Polar Coding for Parallel Gaussian Channels with Non-Binary Inputs and Its Applications to HARQ and MIMO

In this paper, we first propose an universal polar coding scheme for par...
research
02/29/2020

Secure Polar Coding for Adversarial Wiretap Channel

The adversarial wiretap channel (AWTC) model is a secure communication m...
research
01/24/2018

On the Gold Standard for Security of Universal Steganography

While symmetric-key steganography is quite well understood both in the i...
research
07/16/2019

A New Distribution Version of Boneh-Goh-Nissim Cryptosystem: Security and performance analysis

The aim of this paper is to provide two distributed versions of the Bone...

Please sign up or login with your details

Forgot password? Click here to reset