A Model for Adversarial Wiretap Channel
Rei Safavi-Naini, U Calgary, CANADA
Joint work with Pengwei Wang.
A Model for Adversarial Wiretap Channel Rei Safavi-Naini, U - - PowerPoint PPT Presentation
A Model for Adversarial Wiretap Channel Rei Safavi-Naini, U Calgary, CANADA Joint work with Pengwei Wang . Alice wants to send a private message to Bob Shannon (1949) E-enc E-dec Hello n First reliability Hello n Then, secrecy k Hello
Joint work with Pengwei Wang.
n First reliability
Hello Hello
X!-?s4#Lf#@
Enc Dec E-enc E-dec
Hello Hello
n Then, secrecy
n Wyner (1975) n Wiretap channel
W-enc W-dec
M M’ Z
1010010101 1010010101 1010010101
n
n
n
1.
2.
n Limited View Adversary
n Reliability
n Concluding remarks
n Wiretap II (OW ‘84)
(S-N,W ‘13)
0010100.. 0100100.. 0100100..
Dec
m’
1010000001 1010010101
c n n Z X
0000010100
Y
+
Enc
m
1010010101
Δ(X;Y) = 1 2 | Pr(X = i)− Pr(Y = i)|
i
n An efficient capacity achieving code n Σ= Fq n Building blocks
1.
2.
3.
n DDWY ‘93, FW ’98
n Secure Message Transmission
n SMTenc(m, r)=C n SMTdec(C’) =m’
cN c2 c1 c3
c2 c1 c3
c’3 c2 c1
i | i
n A more general adversary model n AWTPenc, AWTPdec à (SMTenc, SMTdec)
n Optimal constructions
1010010 Enc Dec
m c Z X Y m’ n
n N=2t+1 n A more general model of adversary
n Theorem n Comparison: List decodable codes
1010010101
n Building blocks
1.
2.
3.
n Encoding:
n Decoding:
1. 2. 3.
n Requirement:
n LV codes with ρr> 1-ρw n AWTP/LV codes for small alphabet n Interactive coding n Key agreement n AWTP with public discussion