Filters








25,997 Hits in 4.8 sec

Efficient Codes for Limited View Adversarial Channels [article]

Reihaneh Safavi-Naini, Pengwei Wang
2013 arXiv   pre-print
We introduce randomized Limited View (LV) adversary codes that provide protection against an adversary that uses their partial view of the communication to construct an adversarial error vector to be added  ...  An (N, q^RN,δ)-limited view adversary code ensures that the success chance of the adversary in making decoder fail, is bounded by δ when the information rate of the code is at least R.  ...  In Section 4, we present an efficient construction for randomized limited view adversary code. Section 5 discusses our results, open problems and future works. II.  ... 
arXiv:1303.2735v1 fatcat:lxhfozbujjc7dix7ilszfl2ysy

A Model for Adversarial Wiretap Channels and its Applications

Reihaneh Safavi-Naini, Pengwei Wang
2015 Journal of Information Processing  
We consider a coding-theoretic model for wiretap channels with active adversaries who can choose their view of the communication channel and also add adversarial noise to the channel.  ...  In Wyner's model, the adversary is passive.  ...  The adversarial channel was called limited view adversarial channels (LV adversary channel) and the codes that provide reliable communication were referred to as limited view adversary codes (LV-code).  ... 
doi:10.2197/ipsjjip.23.554 fatcat:fuudrnzbjvhdxiuchts6ps5bgm

A Model for Adversarial Wiretap Channel [article]

Pengwei Wang, Reihaneh Safavi-Naini
2014 arXiv   pre-print
Second, we give an explicit construction for a capacity achieving AWTP code family, and prove its security and efficiency properties.  ...  AWTP codes provide secrecy and reliability for communication over these channels.  ...  An adversarial channel closely related to this work is limited view (LV) adversary channel [50] , [51] .  ... 
arXiv:1312.6457v3 fatcat:yecptfdpzfbu7lqjri67hte3je

Optimal Error Correction Against Computationally Bounded Noise [chapter]

Silvio Micali, Chris Peikert, Madhu Sudan, David A. Wilson
2005 Lecture Notes in Computer Science  
For computationally bounded adversarial models of error, we construct appealingly simple, efficient, cryptographic encoding and unique decoding schemes whose error-correction capability is much greater  ...  In addition, our techniques can potentially be used to construct coding schemes that have information rates approaching the Shannon limit.  ...  We also thank the anonymous reviewers for their helpful and thorough comments.  ... 
doi:10.1007/978-3-540-30576-7_1 fatcat:n4xuw3hkabaphcfpfznn647idu

Information-theoretically Secure Key Agreement over Partially Corrupted Channels [article]

Reihaneh Safavi-Naini, Pengwei Wang
2016 arXiv   pre-print
In this paper we consider this problem when the adversary can "partially" control the channel.  ...  We motivate these adversaries by considering adversarial corruptions at the physical layer of communication, give a definition of adversaries that can "partially" eavesdrop and "partially" corrupt the  ...  An (n, k, δ)-Limited-View Adversary Code (or (n, k, δ)-LV adversary code) for a (ρ r , ρ w )-AWTP channel, is a code of dimension k and length n.  ... 
arXiv:1604.03824v1 fatcat:yaqxobqxqnadtnkrhlknl3tdhe

Efficient Codes for Adversarial Wiretap Channels [article]

Pengwei Wang, Reihaneh Safavi-Naini
2014 arXiv   pre-print
In this paper we give the first efficient construction of a capacity achieving code family that provides perfect secrecy for this channel.  ...  In [13] we proposed a (ρ_r , ρ_w )-adversarial wiretap channel model (AWTP) in which the adversary can adaptively choose to see a fraction ρ_r of the codeword sent over the channel, and modify a fraction  ...  In [14] we proposed a model for adversarial channel called limited view adversarial channel (LVAC), which is the same as the adversarial channel considered here.  ... 
arXiv:1401.4633v1 fatcat:ri2foji6w5bbzjjireb2abguu4

Single-Shot Security for One-Time Memories in the Isolated Qubits Model [chapter]

Yi-Kai Liu
2014 Lecture Notes in Computer Science  
These results use Wiesner's idea of conjugate coding, combined with error-correcting codes that approach the capacity of the q-ary symmetric channel, and a high-order entropic uncertainty relation, which  ...  of the (smoothed) min-entropy; they are proven secure against adversaries who can perform arbitrary local operations and classical communication (LOCC); and they are efficiently implementable.  ...  Acknowledgements: It is a pleasure to thank Serge Fehr, Stephen Jordan, Maris Ozols, Rene Peralta, Eren Sasoglu, Christian Schaffner, Barbara Terhal, Alexander Vardy, and several anonymous reviewers, for  ... 
doi:10.1007/978-3-662-44381-1_2 fatcat:ojggb4rnffbvfhmfd5hc3jk56m

Codes against Online Adversaries [article]

Bikash Kumar Dey, Sidharth Jaggi, Michael Langberg
2008 arXiv   pre-print
The codes we construct to attain the optimal rate for each scenario are computationally efficient.  ...  ,x_n symbol-by-symbol over a communication channel. The adversarial jammer can view the transmitted symbols x_i one at a time, and can change up to a p-fraction of them.  ...  As one can efficiently communicate over an erasure channel with rate 1 − p, e.g., [3] , we obtain the same rate for our online channel.  ... 
arXiv:0811.2850v1 fatcat:vejev4flzjdmbetc4wys7gnxvu

Secure Two-Party Computation over a Z-Channel [chapter]

Paolo Palmieri, Olivier Pereira
2011 Lecture Notes in Computer Science  
We provide coding schemes that can further increase the efficiency of the protocol for probabilities distant from the range mentioned above, and also allow the use of a Z-channel with an error probability  ...  The protocol proves to be particularly efficient for a large range of error probabilities p (e.g., for 0.17 ≤ p ≤ 0.29 when a security parameter ε = 10 −9 is chosen), where it requires a limited amount  ...  This particular characteristic eliminates the need for error correction codes, which, in other constructions, limit considerably the range of error probabilities acceptable for secure computation.  ... 
doi:10.1007/978-3-642-24316-5_3 fatcat:d45sclmugjfx3c44aqs3oj7qby

Combating side-channel attacks using key management

Donggang Liu, Qi Dong
2009 2009 IEEE International Symposium on Parallel & Distributed Processing  
This technique leverages the bandwidth limitation of side channels and employs an effective updating mechanism to prevent the keying materials from being exposed.  ...  However, recent studies have shown that adversaries can effectively extract the sensitive data from tamper-resistant modules by launching semi-invasive side-channel attacks such as power analysis and laser  ...  We thus prefer a small b for high efficiency.  ... 
doi:10.1109/ipdps.2009.5161248 dblp:conf/ipps/LiuD09 fatcat:q2kblj2vl5etdc7fhq7n6tuq3e

Optimal Error Correction for Computationally Bounded Noise

Silvio Micali, Chris Peikert, Madhu Sudan, David A. Wilson
2010 IEEE Transactions on Information Theory  
For adversarial but computationally bounded models of error, we construct appealingly simple and efficient cryptographic encoding and unique decoding schemes whose errorcorrection capability is much greater  ...  Our results for large alphabets are actually optimal, since the "computationally bounded but adversarial channel" can simulate the behavior of the q-ary symmetric channel, where q denotes the size of the  ...  Let C be a (ρ, L) efficiently list decodable code for some polynomially growing function L(k).  ... 
doi:10.1109/tit.2010.2070370 fatcat:alp6fnrparen5jhxsfyw6cjpxe

Public Key Locally Decodable Codes with Short Keys [chapter]

Brett Hemenway, Rafail Ostrovsky, Martin J. Strauss, Mary Wootters
2011 Lecture Notes in Computer Science  
The computationally bounded channel model, introduced by Lipton in 1994, views the channel as an adversary which is restricted to polynomial-time computation.  ...  This work considers locally decodable codes in the computationally bounded channel model.  ...  In this model, like in Hamming's model, we view the channel as an adversary who is attempting to cause a decoding error.  ... 
doi:10.1007/978-3-642-22935-0_51 fatcat:7a74aztvprfvvaoxrsq2ydrvza

Optimal Coding for Streaming Authentication and Interactive Communication [chapter]

Matthew Franklin, Ran Gelles, Rafail Ostrovsky, Leonard J. Schulman
2013 Lecture Notes in Computer Science  
In this work we suggest a constant-rate error-correction scheme and an efficient authentication scheme for data streams over a noisy channel (one-way communication, no feedback) in the shared-randomness  ...  is efficient.  ...  Langberg [16] considers private codes for adversarial channels that approach Shannon's bound and require only O(log n) randomness for block size n, as well as an Ω(log n) lower bound for the needed randomness  ... 
doi:10.1007/978-3-642-40084-1_15 fatcat:ednvxg7lbvdmzgehrbgvbwxeye

Upper Bounds on the Capacity of Binary Channels With Causal Adversaries

B. K. Dey, S. Jaggi, M. Langberg, A. D. Sarwate
2013 IEEE Transactions on Information Theory  
The adversarial jammer can view the transmitted bits x_i one at a time, and can change up to a p-fraction of them. However, the decisions of the jammer must be made in a causal manner.  ...  ,x_n) bit-by-bit over a communication channel. The sender and the receiver do not share common randomness.  ...  communication scenario models jamming by an adversary who is limited in his jamming capability (perhaps due to limited transmit energy) and is causal.  ... 
doi:10.1109/tit.2013.2245721 fatcat:5txt4vta3jephfn6apic7hvs2i

SBVLC: Secure Barcode-Based Visible Light Communication for Smartphones

Bingsheng Zhang, Kui Ren, Guoliang Xing, Xinwen Fu, Cong Wang
2016 IEEE Transactions on Mobile Computing  
Index Terms-Short-range smartphone communication, key exchange, secure VLC, 2D barcode streaming, QR codes. ! 2 view angles and leveraging user-induced motions.  ...  We formally analyze the security of SBVLC based on geometric models and propose physical security enhancement mechanisms for barcode communication by manipulating screen view angles and leveraging user-induced  ...  It serves as a milestone for further development in secure VLC systems for smartphones.  ... 
doi:10.1109/tmc.2015.2413791 fatcat:ltbawcurljeddfauzuwmizwedq
« Previous Showing results 1 — 15 out of 25,997 results