2015
DOI: 10.2197/ipsjjip.23.554
|View full text |Cite
|
Sign up to set email alerts
|

A Model for Adversarial Wiretap Channels and its Applications

Abstract: Abstract:In the wiretap model of secure communication, Alice is connected to Bob and Eve by two noisy channels. Wyner's insight was that the difference in noise between the two channels can be used to provide perfect secrecy for communication between Alice and Bob, against the eavesdropper Eve. In Wyner's model, the adversary is passive. We consider a coding-theoretic model for wiretap channels with active adversaries who can choose their view of the communication channel and also add adversarial noise to the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(10 citation statements)
references
References 46 publications
0
10
0
Order By: Relevance
“…In other words, we use a variant of Shamir's scheme based on folded Reed-Solomon codes (instead of plain Reed-Solomon codes) combined with an AMD pre-code. This is very similar to what used in [CDF + 08] to provide robustness in the sense of error-detection, as well as the coding-theoretic construction of SafaviNaini and Wang [SNW15] (the latter additionally uses subspace-evasive sets that we do not need). Combining Shamir's scheme with some type of information-theoretic pre-code (such as a message authentication code) can also be seen as the underlying idea of other existing constructions such as [CDF01].…”
Section: Our Contributionsmentioning
confidence: 67%
See 4 more Smart Citations
“…In other words, we use a variant of Shamir's scheme based on folded Reed-Solomon codes (instead of plain Reed-Solomon codes) combined with an AMD pre-code. This is very similar to what used in [CDF + 08] to provide robustness in the sense of error-detection, as well as the coding-theoretic construction of SafaviNaini and Wang [SNW15] (the latter additionally uses subspace-evasive sets that we do not need). Combining Shamir's scheme with some type of information-theoretic pre-code (such as a message authentication code) can also be seen as the underlying idea of other existing constructions such as [CDF01].…”
Section: Our Contributionsmentioning
confidence: 67%
“…Same as Shamir's scheme and [SNW15], our result does not necessarily require the observations of the adversary to coincide or overlap with the set of manipulated shares. In fact, the number of adaptive observations by the adversary may in general be different from the number of incorrect shares, and this is allowed as long as the total fraction of observations and incorrect shares add up to a quantity sufficiently smaller than 1.…”
Section: Our Contributionsmentioning
confidence: 98%
See 3 more Smart Citations