A Cryptographic Treatment of the Wiretap Channel

Mihir Bellare, Stefano Tessaro, and Alexander Vardy

Abstract

The wiretap channel is a setting where one aims to provide information-theoretic privacy of communicated data based solely on the assumption that the channel from sender to adversary is noisier'' than the channel from sender to receiver. It has been the subject of decades of work in the information and coding (I&C) community. This paper bridges the gap between this body of work and modern cryptography with contributions along two fronts, namely METRICS (definitions) of security, and SCHEMES. We explain that the metric currently in use is weak and insufficient to guarantee security of applications and propose two replacements. One, that we call mis-security, is a mutual-information based metric in the I&C style. The other, semantic security, adapts to this setting a cryptographic metric that, in the cryptography community, has been vetted by decades of evaluation and endorsed as the target for standards and implementations. We show that they are equivalent (any scheme secure under one is secure under the other), thereby connecting two fundamentally different ways of defining security and providing a strong, unified and well-founded target for designs. Moving on to schemes, results from the wiretap community are mostly non-constructive, proving the existence of schemes without necessarily yielding ones that are explicit, let alone efficient, and only meeting their weak notion of security. We apply cryptographic methods based on extractors to produce explicit, polynomial-time and even practical encryption schemes that meet our new and stronger security target.

Available format(s)
Publication info
Published elsewhere. Unknown where it was published
Keywords
Information-theoretic securityentropykeyless
Contact author(s)
mihir @ eng ucsd edu
History
2012-01-20: revised
See all versions
Short URL
https://ia.cr/2012/015

CC BY

BibTeX

@misc{cryptoeprint:2012/015,
author = {Mihir Bellare and Stefano Tessaro and Alexander Vardy},
title = {A Cryptographic Treatment of the Wiretap Channel},
howpublished = {Cryptology ePrint Archive, Paper 2012/015},
year = {2012},
note = {\url{https://eprint.iacr.org/2012/015}},
url = {https://eprint.iacr.org/2012/015}
}

Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.