Universal Hashing for Information-Theoretic Security


Autoria(s): Tyagi, Himanshu; Vardy, Alexander
Data(s)

2015

Resumo

The information-theoretic approach to security entails harnessing the correlated randomness available in nature to establish security. It uses tools from information theory and coding and yields provable security, even against an adversary with unbounded computational power. However, the feasibility of this approach in practice depends on the development of efficiently implementable schemes. In this paper, we review a special class of practical schemes for information-theoretic security that are based on 2-universal hash families. Specific cases of secret key agreement and wiretap coding are considered, and general themes are identified. The scheme presented for wiretap coding is modular and can be implemented easily by including an extra preprocessing layer over the existing transmission codes.

Formato

application/pdf

Identificador

http://eprints.iisc.ernet.in/52592/1/Pro_of_the_IEEE_103-10_1781_2015.pdf

Tyagi, Himanshu and Vardy, Alexander (2015) Universal Hashing for Information-Theoretic Security. In: PROCEEDINGS OF THE IEEE, 103 (10, SI). pp. 1781-1795.

Publicador

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC

Relação

http://dx.doi.org/10.1109/JPROC.2015.2462774

http://eprints.iisc.ernet.in/52592/

Palavras-Chave #Electrical Communication Engineering
Tipo

Journal Article

NonPeerReviewed