A case study in almost-perfect security for unconditionally secure communication
نویسندگان
چکیده
In the Russian cards problem, Alice, Bob and Cath draw a, b and c cards, respectively, from a publicly known deck. Alice and Bob must then communicate their cards to each other without Cath learning who holds a single card. Solutions in the literature provide weak security, where Cath does not know with certainty who holds each card that is not hers, or perfect security, where Cath learns no probabilistic information about who holds any given card from Alice and Bob’s exchange. We propose an intermediate notion, which we call ε-strong security, where the probabilities perceived by Cath may only change by a factor of ε. We then show that a mild variant of the so-called geometric strategy gives ε-strong safety for arbitrarily small ε and appropriately chosen values of a, b, c.
منابع مشابه
Asynchronous Secure Communication Tolerating Mixed Adversaries
We study the problem of secure communication tolerating generalized mixed adversaries across an underlying completely asynchronous incomplete network. We explore the interplay between the minimal network connectivity required and the degree of security attainable, and completely characterize the network requirements for attaining perfect and unconditional (with negligible error) security. We al...
متن کاملEnhanced usage of keys obtained by physical, unconditionally secure distributions
Unconditionally secure physical key distribution schemes are very slow, and it is practically impossible to use a one-time-pad based cipher to guarantee unconditional security for the encryption of data because using the key bits more than once gives out statistical information, for example via the known-plain-text-attack or by utilizing known components of the protocol and language statistics....
متن کاملUnconditionally Secure Computation on Large Distributed Databases with Vanishing Cost
Consider a network of k parties, each holding a long sequence of n entries (a database), with minimum vertex-cut greater than t. We show that any empirical statistic across the network of databases can be computed by each party with perfect privacy, against any set of t ¡ k=2 passively colluding parties, such that the worst-case distortion and communication cost (in bits per database entry) bot...
متن کاملCryptography for Unconditionally Secure Message Transmission in Networks (Invited Talk)
We consider the model of unconditionally secure (r-round, n-channel) message transmission schemes which was introduced by Dolev et al. [1]. In this model, there are n channels between a sender and a receiver, and an infinitely powerful adversary A may corrupt (observe and forge) the messages sent through t out of n channels. The sender wishes to send a secret s to the receiver in r-round withou...
متن کاملun 2 00 4 Perfect random number generator is unnecessary for secure quantum key distribution
Quantum key distribution(QKD) makes it possible for two remotely separated parties do unconditionally secure communications. In principle, the security is guaranteed by the uncertainty principle in quantum mechanics: if any third party watches the key, she must disturbs the quantum bits therefore she has a risk to be detected. However, the security in practice is quite different, since many of ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Des. Codes Cryptography
دوره 83 شماره
صفحات -
تاریخ انتشار 2017