A case study in almost-perfect security for unconditionally secure communication

نویسندگان

  • Esteban Landerreche
  • David Fernández-Duque
چکیده

In the Russian cards problem, Alice, Bob and Cath draw a, b and c cards, respectively, from a publicly known deck. Alice and Bob must then communicate their cards to each other without Cath learning who holds a single card. Solutions in the literature provide weak security, where Cath does not know with certainty who holds each card that is not hers, or perfect security, where Cath learns no probabilistic information about who holds any given card from Alice and Bob’s exchange. We propose an intermediate notion, which we call ε-strong security, where the probabilities perceived by Cath may only change by a factor of ε. We then show that a mild variant of the so-called geometric strategy gives ε-strong safety for arbitrarily small ε and appropriately chosen values of a, b, c.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Asynchronous Secure Communication Tolerating Mixed Adversaries

We study the problem of secure communication tolerating generalized mixed adversaries across an underlying completely asynchronous incomplete network. We explore the interplay between the minimal network connectivity required and the degree of security attainable, and completely characterize the network requirements for attaining perfect and unconditional (with negligible error) security. We al...

متن کامل

Enhanced usage of keys obtained by physical, unconditionally secure distributions

Unconditionally secure physical key distribution schemes are very slow, and it is practically impossible to use a one-time-pad based cipher to guarantee unconditional security for the encryption of data because using the key bits more than once gives out statistical information, for example via the known-plain-text-attack or by utilizing known components of the protocol and language statistics....

متن کامل

Unconditionally Secure Computation on Large Distributed Databases with Vanishing Cost

Consider a network of k parties, each holding a long sequence of n entries (a database), with minimum vertex-cut greater than t. We show that any empirical statistic across the network of databases can be computed by each party with perfect privacy, against any set of t ¡ k=2 passively colluding parties, such that the worst-case distortion and communication cost (in bits per database entry) bot...

متن کامل

Cryptography for Unconditionally Secure Message Transmission in Networks (Invited Talk)

We consider the model of unconditionally secure (r-round, n-channel) message transmission schemes which was introduced by Dolev et al. [1]. In this model, there are n channels between a sender and a receiver, and an infinitely powerful adversary A may corrupt (observe and forge) the messages sent through t out of n channels. The sender wishes to send a secret s to the receiver in r-round withou...

متن کامل

un 2 00 4 Perfect random number generator is unnecessary for secure quantum key distribution

Quantum key distribution(QKD) makes it possible for two remotely separated parties do unconditionally secure communications. In principle, the security is guaranteed by the uncertainty principle in quantum mechanics: if any third party watches the key, she must disturbs the quantum bits therefore she has a risk to be detected. However, the security in practice is quite different, since many of ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Des. Codes Cryptography

دوره 83  شماره 

صفحات  -

تاریخ انتشار 2017