A large-deviations notion of perfect secrecy

被引:16
作者
Merhav, N [1 ]
机构
[1] Technion Israel Inst Technol, Dept Elect Engn, IL-32000 Haifa, Israel
关键词
cryptanalysis; cryptography; Shannon cipher system;
D O I
10.1109/TIT.2002.807301
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We consider the Shannon cipher system with a variable key rate, and study the necessary and sufficient conditions for perfect secrecy in the sense that the exponential rate of the probability of breaking into the system would not be improved by observing the cryptogram. For a memoryless plaintext source, we derive achievable lower bounds on the number of key bits needed for almost every plaintext sequence in every type class. The corresponding minimum achievable average key rate turns out to be the negative logarithm of the probability of the most likely plaintext letter, which is in general, smaller than the entropy.
引用
收藏
页码:506 / 508
页数:3
相关论文
共 22 条
  • [11] Perfect forward secrecy via an ECC-based authentication scheme for SIP in VoIP
    Mahdi Nikooghadam
    Haleh Amintoosi
    The Journal of Supercomputing, 2020, 76 : 3086 - 3104
  • [12] A Large Deviations Approach to Secure Lossy Compression
    Weinberger, Nir
    Merhav, Neri
    2016 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, 2016, : 765 - 769
  • [13] Secure multicast key protocol for electronic mail systems with providing perfect forward secrecy
    Chen, Hsing-Chung
    SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (01) : 100 - 107
  • [14] More efficient identity-based authenticated key agreement with perfect forward secrecy
    Wang, Shengbao
    Cao, Zhenfu
    Cao, Feng
    Journal of Information and Computational Science, 2007, 4 (01): : 317 - 323
  • [15] Perfect forward secrecy via an ECC-based authentication scheme for SIP in VoIP
    Nikooghadam, Mahdi
    Amintoosi, Haleh
    JOURNAL OF SUPERCOMPUTING, 2020, 76 (04) : 3086 - 3104
  • [16] The Capacity Region of Distributed Multi-User Secret Sharing Under Perfect Secrecy
    Wu, Jiahong
    Liu, Nan
    Kang, Wei
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 9954 - 9969
  • [17] Perfect forward secrecy in VoIP networks through design a lightweight and secure authenticated communication scheme
    Ravanbakhsh, Niloofar
    Mohammadi, Mohadeseh
    Nikooghadam, Morteza
    MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (09) : 11129 - 11153
  • [18] Perfect forward secrecy in VoIP networks through design a lightweight and secure authenticated communication scheme
    Niloofar Ravanbakhsh
    Mohadeseh Mohammadi
    Morteza Nikooghadam
    Multimedia Tools and Applications, 2019, 78 : 11129 - 11153
  • [19] Three Constructions of Authentication Codes from Power Function over Finite Fields with Perfect Secrecy
    Wang, Xiuli
    Chen, Shangdi
    Zhou, Maoyuan
    ARS COMBINATORIA, 2012, 106 : 225 - 234
  • [20] TOPAS2-pass key exchange with full perfect forward secrecy and optimal communication complexity
    Schage, Sven
    DESIGNS CODES AND CRYPTOGRAPHY, 2024, 92 (10) : 3085 - 3124