Threshold-Secure Coding with Shared Key

09/29/2019
by   Nasser Aldaghri, et al.
0

Cryptographic protocols are often implemented at upper layers of communication networks, while error-correcting codes are employed at the physical layer. In this paper, we consider utilizing readily-available physical layer functions, such as encoders and decoders, together with shared keys to provide a threshold-type security scheme. To this end, the effect of physical layer communication is abstracted out and the channels between the legitimate parties, Alice and Bob, and the eavesdropper Eve are assumed to be noiseless. We introduce a model for threshold-secure coding, where Alice and Bob communicate using a shared key in such a way that Eve does not get any information, in an information-theoretic sense, about the key as well as about any subset of the input symbols of size up to a certain threshold. Then, a framework is provided for constructing threshold-secure codes form linear block codes while characterizing the requirements to satisfy the reliability and security conditions. Moreover, we propose a threshold-secure coding scheme, based on Reed-Muller (RM) codes, that meets security and reliability conditions. Furthermore, it is shown that the encoder and the decoder of the scheme can be implemented efficiently with quasi-linear time complexity. In particular, a low-complexity successive cancellation decoder is shown for the RM-based scheme. Also, the scheme is flexible and can be adapted given any key length.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
03/02/2018

Physical Layer Security for RF Satellite Channels in the Finite-length Regime

Secure communications is becoming increasingly relevant in the developme...
research
04/04/2020

Low-complexity and Reliable Transforms for Physical Unclonable Functions

Noisy measurements of a physical unclonable function (PUF) are used to s...
research
11/16/2020

Secure Vehicle Communications Using Proof-of-Nonce Blockchain

This paper presents an autonomous driving that achieves physical layer s...
research
10/21/2022

When Wireless Hierarchical Federated Learning Meets Physical Layer Security: A Finite Blocklength Approach

In this paper, the wireless hierarchical federated learning (HFL) is rev...
research
11/06/2018

Local-Encoding-Preserving Secure Network Coding---Part I: Fixed Security Level

Information-theoretic security is considered in the paradigm of network ...
research
11/06/2018

Local-Encoding-Preserving Secure Network Coding---Part II: Flexible Rate and Security Level

In the two-part paper, we consider the problem of secure network coding ...
research
08/20/2017

An improved watermarking scheme for Internet applications

In this paper, a data hiding scheme ready for Internet applications is p...

Please sign up or login with your details

Forgot password? Click here to reset