A joint Shannon cipher and privacy amplification approach to attaining exponentially decaying information leakage
详细信息    查看全文
文摘
In this paper, we propose a novel layering approach to achieve end-to-end exponential security without resorting to presumed physical layer conditions. The only requirement for such an exponentially secure system is existence of a common key source between legitimate users that is partially known by Eve. The novel framework includes a random cipher and key stream generating scheme constituting the first layer and universal hash forming the second layer. The key generating scheme is based on a novel definition of a randomness extractor that derives a key stream with the required entropy from the common source, to be used for cipher. All metrics involved in characterizing the quality of secrecy of two-layer components are related to Rényi entropy and conditional Rényi entropy, which are all ultimately captured in the adopted information leakage metrics: mutual information and Eve’s distinguishability based on L1 norm distance from uniformity. Such relationships are exploited to optimize the resulting bounds for secrecy exponents by selecting appropriate operating parameters including required key rate and source entropies, as well as the required guessing error rate by Eve to attack the first layer.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700