Invertible extractors and wiretap protocols

作者: Mahdi Cheraghchi , Frederic Didier , Amin Shokrollahi

DOI: 10.1109/ISIT.2009.5205583

关键词: Linear network codingAffine transformationBoolean functionMathematicsCryptographyEncoding (memory)Invertible matrixDecoding methodsTheoretical computer scienceBounded function

摘要: A wiretap protocol is a pair of randomized encoding and decoding functions such that knowledge bounded fraction the message reveals essentially no information about message, while entire using decoder. In this paper we study notion efficiently invertible extractors show can be constructed from an extractor. We will then construct for symbol-fixing, affine, general sources apply them to create protocols with asymptotically optimal trade-offs between their rate (ratio length versus its encoding) resilience observed positions encoding). our results challenging communication problems, as active intruders who change portions encoding, network coding, observing arbitrary boolean encoding.

参考文章(54)
V. D. Goppa, Codes on Algebraic Curves Soviet Math. Dokl.. ,vol. 24, pp. 170- 172 ,(1981)
Jon Feldman, Tal Malkin, Cliff Stein, Rocco A Servedio, None, On the Capacity of Secure Network Coding ,(2004)
Shuo-Yen Robert Li, Raymond W. Yeung, Zhen Zhang, Ning Cai, Network Coding Theory ,(2006)
L. H. Ozarow, A. D. Wyner, Wire-tap channel II theory and application of cryptographic techniques. pp. 33- 51 ,(1985) , 10.1007/3-540-39757-4_5
Gilles Brassard, Charles H Bennett, Jean-Marc Robert, How to reduce your enemy's information international cryptology conference. pp. 468- 476 ,(1986)
Madhu Sudan, Yevgeniy Dodis, Exposure-resilient cryptography Massachusetts Institute of Technology. ,(2000)
G. R. Blakley, Catherine Meadows, Security of ramp schemes international cryptology conference. ,vol. 196, pp. 242- 268 ,(1985) , 10.1007/3-540-39568-7_20
Yevgeniy Dodis, Amit Sahai, Adam Smith, On Perfect and Adaptive Security in Exposure-Resilient Cryptography theory and application of cryptographic techniques. pp. 301- 324 ,(2001) , 10.1007/3-540-44987-6_19
Ran Canetti, Yevgeniy Dodis, Shai Halevi, Eyal Kushilevitz, Amit Sahai, Exposure-resilient functions and all-or-nothing transforms theory and application of cryptographic techniques. pp. 453- 469 ,(2000) , 10.1007/3-540-45539-6_33