Noisy channels and cryptography
نویسندگان
چکیده
These notes were written for a combined undergraduate/graduate cryptography course. This material can mostly be found in the text assigned to the graduate students, Codes and Cryptography by Dominic Welsh, but not in the text assigned to the undergraduates, Introduction to Cryptography with Coding Theory by Trappe and Washington. These notes are meant to fill the gap for the undergraduate students. We shall cover Welsh’s material but not in the depth found in the book.
منابع مشابه
Oblivious Transfer from Weak Noisy Channels
Various results show that oblivious transfer can be implemented using the assumption of noisy channels. Unfortunately, this assumption is not as weak as one might think, because in a cryptographic setting, these noisy channels must satisfy very strong security requirements. Unfair noisy channels, introduced by Damg̊ard, Kilian and Salvail [Eurocrypt ’99], reduce these limitations: They give the ...
متن کاملMessage Authentication over Noisy Channels
The essence of authentication is the transmission of unique and irreproducible information. In this paper, the authentication becomes a problem of the secure transmission of the secret key over noisy channels. A general analysis and design framework for message authentication is presented based on the results of Wyner’s wiretap channel. Impersonation and substitution attacks are primarily inves...
متن کاملPosition-Based Cryptography from the Noisy Channels
We study the problem of constructing secure positioning protocols (Sastry et. al, 2003). Informally, the goal of such protocols is to enable a party P to convince a set of verifiers about P ’s location in space, using information about the time it takes P to respond to queries sent from different points. It has been shown by Chandramn et al (2009) that in general such task is impossible to achi...
متن کاملSecure Computation from Elastic Noisy Channels
Noisy channels enable unconditionally secure multi-party computation even against parties with unbounded computational power. But inaccurate noise estimation and adversarially determined channel characteristics render known protocols insecure. Such channels are known as unreliable noisy channels. A large body of work in the last three decades has attempted to construct secure multi-party comput...
متن کاملIdentity Authentication over Noisy Channels
Identity authentication is the process of verifying users’ validity. Unlike classical key-based authentications, which are built on noiseless channels, this paper introduces a general analysis and design framework for identity authentication over noisy channels. Specifically, the authentication scenarios of single time and multiple times are investigated. For each scenario, the lower bound on t...
متن کامل