Invertible Extractors and Wiretap Protocols. Cheraghchi, M., Didier, F., & Shokrollahi, A. In Proceedings of the IEEE International Symposium on Information Theory (ISIT), pages 1934–1938, 2009. Extended version in IEEE Transactions on Information Theory.Link Paper doi abstract bibtex A wiretap protocol is a pair of randomized encoding and decoding functions such that knowledge of a bounded fraction of the encoding of a message reveals essentially no information about the message, while knowledge of the entire encoding reveals the message using the decoder. In this paper, the notion of efficiently invertible extractors is studied and it is shown that a wiretap protocol can be constructed from such an extractor. Then, invertible extractors for symbol-fixing, affine, and general sources are constructed and used to create wiretap protocols with asymptotically optimal trade-offs between their rate (ratio of the length of the message versus its encoding) and resilience (ratio of the observed positions of the encoding and the length of the encoding). The results are further applied to create wiretap protocols for challenging communication problems, such as active intruders who change portions of the encoding, network coding, and intruders observing arbitrary Boolean functions of the encoding. As a by-product of the constructions, new explicit extractors for a restricted family of affine sources over large fields is obtained (that in particular generalizes the notion of symbol-fixing sources) which is of independent interest. These extractors are able to extract the entire source entropy with zero error.
@INPROCEEDINGS{ref:conf:CDS09,
author = {Mahdi Cheraghchi and Fr\'ed\'eric Didier and Amin
Shokrollahi},
title = {Invertible Extractors and Wiretap Protocols},
booktitle = {Proceedings of the {IEEE International Symposium on
Information Theory (ISIT)}},
year = 2009,
pages = {1934--1938},
note = {Extended version in IEEE Transactions on Information
Theory.},
doi = {10.1109/ISIT.2009.5205583},
url_Link = {https://ieeexplore.ieee.org/document/5205583},
url_Paper = {https://arxiv.org/abs/0901.2120},
abstract = {A wiretap protocol is a pair of randomized encoding
and decoding functions such that knowledge of a
bounded fraction of the encoding of a message
reveals essentially no information about the
message, while knowledge of the entire encoding
reveals the message using the decoder. In this
paper, the notion of efficiently invertible
extractors is studied and it is shown that a wiretap
protocol can be constructed from such an extractor.
Then, invertible extractors for symbol-fixing,
affine, and general sources are constructed and used
to create wiretap protocols with asymptotically
optimal trade-offs between their rate (ratio of the
length of the message versus its encoding) and
resilience (ratio of the observed positions of the
encoding and the length of the encoding). The
results are further applied to create wiretap
protocols for challenging communication problems,
such as active intruders who change portions of the
encoding, network coding, and intruders observing
arbitrary Boolean functions of the encoding. As a
by-product of the constructions, new explicit
extractors for a restricted family of affine sources
over large fields is obtained (that in particular
generalizes the notion of symbol-fixing sources)
which is of independent interest. These extractors
are able to extract the entire source entropy with
zero error. },
keywords = {Wiretap Channel, Extractors, Network Coding, Active
Intrusion, Exposure Resilient Cryptography}
}
Downloads: 0
{"_id":"D7cXGFxWhWy4H7u8H","bibbaseid":"cheraghchi-didier-shokrollahi-invertibleextractorsandwiretapprotocols-2009","authorIDs":["2n8MNophuzbeevTa8","3NEcSaujokmJYSDaa","3tFWxWs2qWeYAZx9a","4QNcMTdRiWr2gs8Sk","5KoQWR3vSjnsoZNz5","5i4QHRc5LGio8Mf5u","62bYDgAFwCxaQ4Q9T","685mTysGDdQJKGxEE","6sX76eTffL7p76peN","8NLx3B3FAvaK54hSK","9NZpjMJLG7dNWroGm","9aD4MPX9ELhsyJmaR","9aFgrqcc4j28kZn8n","A9wAgP7TPK9tw28qY","BJ6h7zrsT3L89RKSg","BWL9E9QxvrST7y7ym","Cht4qGZ9eYAvPygNC","D3NMRJpac7Z2oFz7x","EiL6Xv4GTWGB97B8H","F3Y934eNyTeEJsg6E","FDEj5Zwdm28pFcAnB","FJdyLy2TL3v973ge8","GxccwstJJuJ4rg7Dq","H4D7r27RcPALT5DCs","HP7szFXWBWFXXZhdA","HRX7xsd7ZkTNvr67D","Hj3KN5PTNMST8hD3b","JEvEPvDBYNNXgGBnp","JYpde2ppjXLva6cre","KFgC2dZG7jXYAgZ3T","NRg9mmaSB55QqzNnH","NWCEkq6XqRBCiGmMe","NpGaG45evixRFDMiF","NyDiXeBc7cuxdWrqh","P6pva6vpPZCz6ndh9","Py2jfYGNZKNt7nxL6","Q6E9aDkYPcbhngLMx","QYrXKExv3BPABZGyA","QupQWsidagmv2nu8Z","SGZ2YignSm7njeTxy","SSuyWxzudqBDgAosw","THz3CmRmH3zZ9Xfud","TTEBJzPHwrY4d2Qfi","Wzr7kB4bxMDqceidA","YedfCw6zcDLoWAWFL","YtTEuSL9GJ8pkKcZw","Z3w2d32WjDczZMeGo","aduB2YE7dcNtbHnAN","c8gPvTXFPd9NazgEw","d6HAadRZAtz97Y2so","dTBDNYCcYKNNdhqaR","ezDt3Lb3Q6Sbo2rfX","fXtxgjbjZswBmF45i","ftBpmnKRHoB2muB8u","gKxHau44e8gnmxs6v","hM29eSWZbASnmDdFf","hw7Q4GHDAHkLTAyeB","i6Ns5rSW8R3ifxeHg","jJcoL4QWRkJQ59LfW","kKvRZ55rH7sfbubS2","kdfqsAMqCFDhpuW3S","koPTGcsAkwhGbkAYe","manxWg6Q3ZC5vW4JE","pwN2yYKo5DdSDaZGs","qpSgMrJ8WQNupjbXX","sD5Wq95oeSzqGF9kn","uSGLWGoXjyDyozeEy","wCcpScxkvg5RkcmWm","xKz7kx4eXbnkHeNXP","xeiij9YsbXBbMjciP","yGxZz3yuu6krMRxgK","yjJrpKY5QmDe8SXvm","zaR6PwJ7aC9xWBpiy"],"author_short":["Cheraghchi, M.","Didier, F.","Shokrollahi, A."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","author":[{"firstnames":["Mahdi"],"propositions":[],"lastnames":["Cheraghchi"],"suffixes":[]},{"firstnames":["Frédéric"],"propositions":[],"lastnames":["Didier"],"suffixes":[]},{"firstnames":["Amin"],"propositions":[],"lastnames":["Shokrollahi"],"suffixes":[]}],"title":"Invertible Extractors and Wiretap Protocols","booktitle":"Proceedings of the IEEE International Symposium on Information Theory (ISIT)","year":"2009","pages":"1934–1938","note":"Extended version in IEEE Transactions on Information Theory.","doi":"10.1109/ISIT.2009.5205583","url_link":"https://ieeexplore.ieee.org/document/5205583","url_paper":"https://arxiv.org/abs/0901.2120","abstract":"A wiretap protocol is a pair of randomized encoding and decoding functions such that knowledge of a bounded fraction of the encoding of a message reveals essentially no information about the message, while knowledge of the entire encoding reveals the message using the decoder. In this paper, the notion of efficiently invertible extractors is studied and it is shown that a wiretap protocol can be constructed from such an extractor. Then, invertible extractors for symbol-fixing, affine, and general sources are constructed and used to create wiretap protocols with asymptotically optimal trade-offs between their rate (ratio of the length of the message versus its encoding) and resilience (ratio of the observed positions of the encoding and the length of the encoding). The results are further applied to create wiretap protocols for challenging communication problems, such as active intruders who change portions of the encoding, network coding, and intruders observing arbitrary Boolean functions of the encoding. As a by-product of the constructions, new explicit extractors for a restricted family of affine sources over large fields is obtained (that in particular generalizes the notion of symbol-fixing sources) which is of independent interest. These extractors are able to extract the entire source entropy with zero error. ","keywords":"Wiretap Channel, Extractors, Network Coding, Active Intrusion, Exposure Resilient Cryptography","bibtex":"@INPROCEEDINGS{ref:conf:CDS09,\n author =\t {Mahdi Cheraghchi and Fr\\'ed\\'eric Didier and Amin\n Shokrollahi},\n title =\t {Invertible Extractors and Wiretap Protocols},\n booktitle =\t {Proceedings of the {IEEE International Symposium on\n Information Theory (ISIT)}},\n year =\t 2009,\n pages =\t {1934--1938},\n note =\t {Extended version in IEEE Transactions on Information\n Theory.},\n doi =\t\t {10.1109/ISIT.2009.5205583},\n url_Link =\t {https://ieeexplore.ieee.org/document/5205583},\n url_Paper =\t {https://arxiv.org/abs/0901.2120},\n abstract =\t {A wiretap protocol is a pair of randomized encoding\n and decoding functions such that knowledge of a\n bounded fraction of the encoding of a message\n reveals essentially no information about the\n message, while knowledge of the entire encoding\n reveals the message using the decoder. In this\n paper, the notion of efficiently invertible\n extractors is studied and it is shown that a wiretap\n protocol can be constructed from such an extractor.\n Then, invertible extractors for symbol-fixing,\n affine, and general sources are constructed and used\n to create wiretap protocols with asymptotically\n optimal trade-offs between their rate (ratio of the\n length of the message versus its encoding) and\n resilience (ratio of the observed positions of the\n encoding and the length of the encoding). The\n results are further applied to create wiretap\n protocols for challenging communication problems,\n such as active intruders who change portions of the\n encoding, network coding, and intruders observing\n arbitrary Boolean functions of the encoding. As a\n by-product of the constructions, new explicit\n extractors for a restricted family of affine sources\n over large fields is obtained (that in particular\n generalizes the notion of symbol-fixing sources)\n which is of independent interest. These extractors\n are able to extract the entire source entropy with\n zero error. },\n keywords =\t {Wiretap Channel, Extractors, Network Coding, Active\n Intrusion, Exposure Resilient Cryptography}\n}\n\n","author_short":["Cheraghchi, M.","Didier, F.","Shokrollahi, A."],"key":"ref:conf:CDS09","id":"ref:conf:CDS09","bibbaseid":"cheraghchi-didier-shokrollahi-invertibleextractorsandwiretapprotocols-2009","role":"author","urls":{" link":"https://ieeexplore.ieee.org/document/5205583"," paper":"https://arxiv.org/abs/0901.2120"},"keyword":["Wiretap Channel","Extractors","Network Coding","Active Intrusion","Exposure Resilient Cryptography"],"metadata":{"authorlinks":{"cheraghchi, m":"https://mahdi.ch/"}}},"bibtype":"inproceedings","biburl":"http://mahdi.ch/writings/cheraghchi.bib","creationDate":"2020-05-29T02:17:02.083Z","downloads":2,"keywords":["wiretap channel","extractors","network coding","active intrusion","exposure resilient cryptography"],"search_terms":["invertible","extractors","wiretap","protocols","cheraghchi","didier","shokrollahi"],"title":"Invertible Extractors and Wiretap Protocols","year":2009,"dataSources":["YZqdBBx6FeYmvQE6D"]}