Interactive message transmission over adversarial wiretap channel II
Title | Interactive message transmission over adversarial wiretap channel II |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Wang, P., Safavi-Naini, R. |
Conference Name | IEEE INFOCOM 2017 - IEEE Conference on Computer Communications |
Date Published | may |
ISBN Number | 978-1-5090-5336-0 |
Keywords | active adversary, adversarial noise, adversarial wiretap channel II, Collaboration, composability, Conferences, cryptographic protocols, Human Behavior, human factor, information theoretic security, interactive message transmission, interactive protocols, jamming, jamming signal, Metrics, Mobile communication, perfect information theoretic security, perfectly secure protocol family, policy, Protocols, pubcrawl, public key infrastructure, quantum computers, Random variables, reliability, Resiliency, Scalability, security, telecommunication security, two-way wiretap II channel, Upper bound, wireless channels, wireless setting, Wyner wiretap II model |
Abstract | In Wyner wiretap II model of communication, Alice and Bob are connected by a channel that can be eavesdropped by an adversary with unlimited computation who can select a fraction of communication to view, and the goal is to provide perfect information theoretic security. Information theoretic security is increasingly important because of the threat of quantum computers that can effectively break algorithms and protocols that are used in today's public key infrastructure. We consider interactive protocols for wiretap II channel with active adversary who can eavesdrop and add adversarial noise to the eavesdropped part of the codeword. These channels capture wireless setting where malicious eavesdroppers at reception distance of the transmitter can eavesdrop the communication and introduce jamming signal to the channel. We derive a new upperbound R 1 - r for the rate of interactive protocols over two-way wiretap II channel with active adversaries, and construct a perfectly secure protocol family with achievable rate 1 - 2r + r2. This is strictly higher than the rate of the best one round protocol which is 1 - 2r, hence showing that interaction improves rate. We also prove that even with interaction, reliable communication is possible only if r \textbackslashtextless; 1/2. An interesting aspect of this work is that our bounds will also hold in network setting when two nodes are connected by n paths, a r of which is corrupted by the adversary. We discuss our results, give their relations to the other works, and propose directions for future work. |
URL | https://ieeexplore.ieee.org/document/8057120 |
DOI | 10.1109/INFOCOM.2017.8057120 |
Citation Key | wang_interactive_2017 |
- Scalability
- Policy
- Protocols
- pubcrawl
- public key infrastructure
- quantum computers
- Random variables
- Reliability
- Resiliency
- perfectly secure protocol family
- security
- telecommunication security
- two-way wiretap II channel
- Upper bound
- wireless channels
- wireless setting
- Wyner wiretap II model
- information theoretic security
- adversarial noise
- adversarial wiretap channel II
- collaboration
- composability
- Conferences
- Cryptographic Protocols
- Human behavior
- human factor
- active adversary
- interactive message transmission
- interactive protocols
- Jamming
- jamming signal
- Metrics
- Mobile communication
- perfect information theoretic security