A Model for Adversarial Wiretap Channel Rei Safavi-Naini, U - - PowerPoint PPT Presentation

a model for adversarial wiretap channel
SMART_READER_LITE
LIVE PREVIEW

A Model for Adversarial Wiretap Channel Rei Safavi-Naini, U - - PowerPoint PPT Presentation

A Model for Adversarial Wiretap Channel Rei Safavi-Naini, U Calgary, CANADA Joint work with Pengwei Wang . Alice wants to send a private message to Bob Shannon (1949) E-enc E-dec Hello n First reliability Hello n Then, secrecy k Hello


slide-1
SLIDE 1

A Model for Adversarial Wiretap Channel

Rei Safavi-Naini, U Calgary, CANADA

Joint work with Pengwei Wang.

slide-2
SLIDE 2

Alice wants to send a private message to Bob

Shannon (1949)

n First reliability

Hello Hello

X!-?s4#Lf#@

Enc Dec E-enc E-dec

Hello Hello

n Then, secrecy

H(M | Z) = H(M)

k

slide-3
SLIDE 3

n Wyner (1975) n Wiretap channel

Secrecy: 1 k H(M | Z) ≥1−ε Reliability: Pr (M' ≠ M) ≤ε

à Perfect secrecy

W-enc W-dec

M M’ Z

1010010101 1010010101 1010010101

Alice wants to send a private message to Bob

slide-4
SLIDE 4

Adversary

slide-5
SLIDE 5

This talk:

n

A model for adversarial wiretap

n

Bound & construction

n

Relations with other primitives

1.

Networks

2.

Secret Sharing

n Limited View Adversary

n Reliability

n Concluding remarks

slide-6
SLIDE 6

Adversarial Wiretap Channel

n Wiretap II (OW ‘84)

Adversarial wiretap

(S-N,W ‘13)

Wireless

0010100.. 0100100.. 0100100..

+

slide-7
SLIDE 7

Adversarial Wiretap Channel

| Sr |= ρrN, | Sw |= ρwN

Dec

m’

1010000001 1010010101

c n n Z X

0000010100

Sr

Y

+

Sw

Enc

m

1010010101

Goals: Reliability & Privacy

slide-8
SLIDE 8

AWTP Codes

AWTPenc : M × R → C ⊂ ∑N AWTPdec : ∑N → M (ε,δ)− AWTP code:

  • Δ(ViewA(m1);ViewA(m2)) ≤ε
  • Pr(M ' ≠ M) ≤δ

R(C N ) = log | M | N log | ∑ |= 1 N log|∑| | M |

Sr Sw | Sr |= ρrN | Sw |= ρwN

Δ(X;Y) = 1 2 | Pr(X = i)− Pr(Y = i)|

i

slide-9
SLIDE 9

ε-Code Family Cε: {C N}N∈N R(Cε) : for any ξ , there exists N0, such that, N > N0, 1 N log|∑| | M | ≥ R(Cε) -ξ Capacity of a ( ρr,ρw)− channel : Cε = maxCεR(Cε) ⇒ Fraction of a bit that can be sent with perfect reliability, and ε-security.

AWTP Codes

slide-10
SLIDE 10

Upperbound & Capacity

ρr = ρw = ρ ⇒ 0 ≤ C0 =1− 2ρ ⇒ ρ ≤ 1 2

Theorem: Cε ≤1− ρr − ρw + 2 ερr (1+ log|Σ| 1 ε ) C0 =1− ρr − ρw

slide-11
SLIDE 11

Construction

n An efficient capacity achieving code n Σ= Fq n Building blocks

1.

AMD codes [CDFPW ‘08]

2.

Subset evasive sets [DL ‘11]

3.

Folded Reed-Solomon codes [GD ‘8]

AWTPenc = FRS(SESenc(AMD(m ||[0]g))||[r]uρrL) AWTPdec =AMDdec(SESdec(FRSdec(y)))

slide-12
SLIDE 12

Relation with other primitives

  • 1. Networks
  • 2. Secret Sharing
slide-13
SLIDE 13

Relation with other primitives: Security in networks

n DDWY ‘93, FW ’98

n Secure Message Transmission

n SMTenc(m, r)=C n SMTdec(C’) =m’

cN c2 c1 c3

(ε,δ)− SMT maxm1,m2 Δ(ViewA(m1,r);ViewA(m2,r)) ≤ε Correctness: ∀m ∈ M, PrR(Dec(C') ≠ m) ≤δ C’

c2 c1 c3

C

c’3 c2 c1

slide-14
SLIDE 14

Efficiency and Bounds

Corruption Transmission rate

τ = log|V

i | i

log|M| τ ≥ Ω( N N − 2t)

N ≥ 2t +1 1− round (0,0)-SMT : N ≥ 3t +1

slide-15
SLIDE 15

AWTP à SMT

n A more general adversary model n AWTPenc, AWTPdec à (SMTenc, SMTdec)

n Optimal constructions

ρw = ρr = ρ τ(SMT) ≥ 1 1− 2ρ +δ' δ' = 2H(δ) N log | Σ | + 2δ

slide-16
SLIDE 16

Relation with other primitives: Robust Secret Sharing

P1 PL-1 P2 PL

SD(ViewA(m1,r);ViewA(m1,r)) = 0 Pr(m' ∉ {m,⊥}) ≤δ

Dealer Reconstruct

Share(m,r)=(s1,s2!sL) Reconst(s1,s2!st)=m

1010010 Enc Dec

m c Z X Y m’ n

Reconst(s'1,s'2!s'L)=m'

slide-17
SLIDE 17

AWTP à Robust SS

n N=2t+1 n A more general model of adversary

AWTPenc, AWTPdec à (RSSenc, RSSdec)

slide-18
SLIDE 18

Limited View Adversary Reliability Only

n Theorem n Comparison: List decodable codes

1010010101

C ≤1− ρw

Sr Sw

slide-19
SLIDE 19

Limited View Adversary Code

n Building blocks

1.

Message Authentication Codes

2.

AWTP Code

3.

FRS code with subspace evasive set

n Encoding:

AWTPenc = cAWTP cFRS ⎡ ⎣ ⎢ ⎢ ⎤ ⎦ ⎥ ⎥ cAWTP = AWTPenc(r) cFRS = FRSenc(m,t = MAC(m,r))

slide-20
SLIDE 20

Limited View Adversary Code

n Decoding:

1. 2. 3.

n Requirement:

r = AWTPdec(cAWTP) (mi,ti) ∈L = FRSdec(cFRS) ti = ? MAC(mi,r) ρr <1− ρw

slide-21
SLIDE 21

Concluding remarks

n LV codes with ρr> 1-ρw n AWTP/LV codes for small alphabet n Interactive coding n Key agreement n AWTP with public discussion

slide-22
SLIDE 22