Polynomial-Time, Semantically-Secure Encryption Achieving the Secrecy Capacity

نویسندگان

  • Mihir Bellare
  • Stefano Tessaro
چکیده

In the wiretap channel setting, one aims to get information-theoretic privacy of communicated data based only on the assumption that the channel from sender to adversary is noisier than the one from sender to receiver. The secrecy capacity is the optimal (highest possible) rate of a secure scheme, and the existence of schemes achieving it has been shown. For thirty years the ultimate and unreached goal has been to achieve this optimal rate with a scheme that is polynomial-time. (This means both encryption and decryption are proven polynomial time algorithms.) This paper finally delivers such a scheme. In fact it does more. Our scheme not only meets the classical notion of security from the wiretap literature, called MIS-R (mutual information security for random messages) but achieves the strictly stronger notion of semantic security, thus delivering more in terms of security without loss of rate. 1 Department of Computer Science & Engineering, University of California San Diego, 9500 Gilman Drive, La Jolla, California 92093, USA. Email: [email protected]. URL: http://www.cs.ucsd.edu/users/mihir. Supported in part by NSF grants CNS-0904380 and CCF-0915675. 2 Department of Computer Science & Engineering, University of California San Diego, 9500 Gilman Drive, La Jolla, California 92093, USA. Email: [email protected]. URL: http://www.cs.ucsd.edu/users/stessaro. Supported in part by Calit2 and NSF grant CNS-0716790.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Semantically-Secure Coding Scheme Achieving the Capacity of a Gaussian Wiretap Channel

We extend a recently proposed wiretap coding scheme to the Gaussian wiretap channel and show that it is semantically-secure. Denoting by SNR the signal-to-noise ratio of the eavesdropper’s channel, the proposed scheme converts a transmission code of rate R for the channel of the legitimate receiver into a code of rate R− 0.5 log(1 + SNR) for the Gaussian wiretap channel. The conversion has a po...

متن کامل

Functional Encryption with Bounded Collusions via Multi-party Computation

We construct functional encryption schemes for polynomialtime computable functions secure against an a-priori bounded polynomial number of collusions. Our constructions require only semantically secure public-key encryption schemes and pseudorandom generators computable by small-depth circuits (known to be implied by most concrete intractability assumptions). For certain special cases such as p...

متن کامل

Timed Encryption and Its Application

In this paper, we propose a new notion of timed encryption, in which the encryption is secure within time t while it is totally insecure after some time T > t. We are interested in the case where t and T are both polynomial. We propose a concrete construction that is provably secure in the random oracle model. We show that it can be generically (although inefficient) constructed from a timed co...

متن کامل

Secrecy Capacity Achieving with Physical Layer Security Approach in MIMO Two-Way Relay Channels

In this paper, we propose a novel secure transmission scheme for MIMO Two-Way Relay Channels. By exploiting the properties of the transmission medium in the physical layer, our proposed scheme could achieve a high transmission efficiency as well as security. Two different approaches has been introduced including Information Theoretical approach and Physical Layer Encryption approach. Direction ...

متن کامل

Classical-quantum arbitrarily varying wiretap channel: Ahlswede dichotomy, positivity, resources, super-activation

We establish the Ahlswede dichotomy for arbitrarily varying classicalquantum wiretap channels, i.e., either the deterministic secrecy capacity of the channel is zero, or it equals its randomness-assisted secrecy capacity. We analyze the secrecy capacity of these channels when the sender and the receiver use various resources. It turns out that randomness, common randomness, and correlation as r...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2012  شماره 

صفحات  -

تاریخ انتشار 2012