Unconditionally Secure Ciphers with a Short Key for a Source with Unknown Statistics
Abstract
:1. Introduction
2. Definitions and Preliminaries
2.1. Basic Concepts
2.2. -Entropically Secure Ciphers for Distributions with Bounded Min-Entropy
2.3. -Entropically Secure Ciphers with Reduced Secret Key
- (i)
- is ϵ-entropically secure with secret key length , and
- (ii)
- is ϵ-indistinguishable with secret key length .
2.4. Universal Coding
3. The Cipher
- (i)
- Compute the distribution q according to (5) and order the set . (Denote the ordered probabilities as , and let for which .)
- (ii)
- (iii)
- Build the following randomized map First, find and then define for
- (iv)
- For the desired leakage build with secret key length
- (i)
- The is ϵ-entropically secure with secret key length , and
- (ii)
- The is ϵ–indistinguishable with secret key length .
- (i)
- -entropically secure with a secret key of length , and
- (ii)
- -indistinguishable with a secret key of length .
4. Conclusions
Funding
Institutional Review Board Statement
Data Availability Statement
Conflicts of Interest
References
- Shannon, C.E. Communication theory of secrecy systems. Bell Syst. Tech. J. 1949, 28, 656–715. [Google Scholar] [CrossRef]
- Juels, A.; Ristenpart, T. Honey encryption: Security beyond the brute-force bound. In Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, 11–15 May 2014; Springer: Berlin/Heidelberg, Germany, 2014; pp. 293–310. [Google Scholar]
- Russell, A.; Wang, H. How to fool an unbounded adversary with a short key. IEEE Trans. Inf. Theory 2006, 52, 1130–1140. [Google Scholar] [CrossRef]
- Jaeger, J.; Ristenpart, T.; Tang, Q. Honey encryption beyond message recovery security. In Advances in Cryptology—EUROCRYPT 2016, Proceedings of the 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, 8–12 May 2016; Springer: Berlin/Heidelberg, Germany, 2016. [Google Scholar]
- Dodis, Y.; Smith, A. Entropic security and the encryption of high entropy messages. In Proceedings of the Theory of Cryptography Conference, Cambridge, MA, USA, 10–12 February 2005; Springer: Berlin/Heidelberg, Germany, 2005; pp. 556–577. [Google Scholar]
- du Pin Calmon, F.; Médard, M.; Zeger, L.M.; Barros, J.; Christiansen, M.M.; Duffy, K.R. Lists that are smaller than their parts: A coding approach to tunable secrecy. In Proceedings of the 50th Annual Allerton Conference on Communication, Control, and Computing, Allerton, Monticello, IL, USA, 1–5 October 2012; pp. 1387–1394. [Google Scholar]
- Calmon, F.D. Information-Theoretic Metrics for Security and Privacy. Ph.D. Thesis, Massachusetts Institute of Technology, Cambridge, MA, USA, 2015. [Google Scholar]
- Li, X.; Tang, Q.; Zhang, Z. Fooling an Unbounded Adversary with a Short Key, Repeatedly: The Honey Encryption Perspective. In Proceedings of the 2nd Conference on Information-Theoretic Cryptography (ITC 2021), Virtually, 24–26 July 2021; Schloss Dagstuhl-Leibniz-Zentrum Informatik: Wadern, Germany, 2021. [Google Scholar]
- Ryabko, B. Unconditionally secure short key ciphers based on data compression and randomization. Des. Codes Cryptogr. 2023, 91, 2201–2212. [Google Scholar] [CrossRef]
- Lucamarini, M.; Yuan, Z.L.; Dynes, J.F.; Shields, A.J. Overcoming the rate-distance limit of quantum key distribution without quantum repeaters. Nature 2018, 557, 400–403. [Google Scholar] [CrossRef]
- Wang, X.B.; Yu, Z.W.; Hu, X.L. Twin-field quantum key distribution with large misalignment error. Phys. Rev. A 2018, 98, 062323. [Google Scholar] [CrossRef]
- Liu, Y.; Zhang, W.J.; Jiang, C.; Chen, J.P.; Zhang, C.; Pan, W.X.; Ma, D.; Dong, H.; Xiong, J.M.; Zhang, C.J.; et al. Experimental twin-field quantum key distribution over 1000 km fiber distance. Phys. Rev. Lett. 2023, 130, 210801. [Google Scholar] [CrossRef]
- Krichevsky, R. Universal Compression and Retrival; Kluver Academic Publishers: Dordrecht, The Netherlands, 1993. [Google Scholar]
- Shkel, Y.Y.; Poor, H.V. A compression perspective on secrecy measures. IEEE J. Sel. Areas Inf. Theory 2021, 2, 163–176. [Google Scholar] [CrossRef]
- Bloch, M.; Günlü, O.; Yener, A.; Oggier, F.; Poor, H.V.; Sankar, L.; Schaefer, R.F. An overview of information-theoretic security and privacy: Metrics, limits and applications. IEEE J. Sel. Areas Inf. Theory 2021, 2, 5–22. [Google Scholar] [CrossRef]
- Ryabko, B.; Fionov, A. Cryptography in the Information Society; World Scientific Publishing: Singapore, 2020; 280p. [Google Scholar]
- Gunther, C.G. A universal algorithm for homophonic coding. In Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques, Davos, Switzerland, 25–27 May 1988; Springer: Berlin/Heidelberg, 1988; pp. 405–414. [Google Scholar]
- Naor, J.; Naor, M. Small-bias probability spaces: Efficient constructions and applications. In Proceedings of the Twenty-Second Annual ACM Symposium on Theory of Computing, Baltimore, MD, USA, 13–17 May 1990; pp. 213–223. [Google Scholar]
- Alon, N.; Goldreich, O.; Håstad, J.; Peralta, R. Simple constructions of almost k-wise independent random variables. Random Struct. Algorithms 1992, 3, 289–304. [Google Scholar] [CrossRef]
- Fitingof, B.M. Optimal coding in the case of unknown and changing message statistics. Probl. Peredachi Inf. 1966, 2, 3–11. [Google Scholar]
- Krichevsky, R. A relation between the plausibility of information about a source and encoding redundancy. Probl. Inform. Transm. 1968, 4, 48–57. [Google Scholar]
- Cleary, J.; Witten, I. Data compression using adaptive coding and partial string matching. IEEE Trans. Commun. 1984, 32, 396–402. [Google Scholar] [CrossRef]
- Rissanen, J.; Langdon, G.G. Arithmetic coding. IBM J. Res. Dev. 1979, 23, 149–162. [Google Scholar] [CrossRef]
- Ziv, J.; Lempel, A. A universal algorithm for sequential data compression. IEEE Trans. Inf. Theory 1977, 23, 337–343. [Google Scholar] [CrossRef]
- Burrows, M.; Wheeler, D.J. A block-sorting lossless data compression algorithm. SRS Res. Rep. 1994, 124, 10009821328. [Google Scholar]
- Ryabko, B.Y. Data compression by means of a “book stack”. Probl. Peredachi Inf. 1980, 16, 16–21. [Google Scholar]
- Bentley, J.; Sleator, D.; Tarjan, R.; Wei, V. A locally adaptive data compression scheme. Commun. ACM 1986, 29, 320–330. [Google Scholar] [CrossRef]
- Ryabko, B.; Horspool, N.R.; Cormack, G.V.; Sekar, S.; Ahuja, S.B. Technical correspondence. Commun. ACM 1987, 30, 792–797. [Google Scholar]
- Kieffer, J.C.; Yang, E.-H. Grammar-based codes: A new class of universal lossless source codes. IEEE Trans. Inf. Theory 2000, 46, 737–754. [Google Scholar] [CrossRef]
- Yang, E.-H.; Kieffer, J.C. Efficient universal lossless data compression algorithms based on a greedy sequential grammar transform. i. without context models. IEEE Trans. Inf. Theory 2000, 46, 755–777. [Google Scholar] [CrossRef]
- Drmota, M.; Reznik, Y.; Szpankowski, W. Tunstall code, Khodak variations, and random walks. IEEE Trans. Inf. Theory 2010, 56, 2928–2937. [Google Scholar] [CrossRef]
- Louchard, G.; Szpankowski, W. Average profile and limiting distribution for a phrase size in the Lempel-Ziv parsing algorithm. IEEE Trans. Inf. Theory 1995, 41, 478–488. [Google Scholar] [CrossRef]
- Ryabko, B. Twice-universal coding. Probl. Inf. Transm. 1984, 3, 173–177. [Google Scholar]
- Reznik, Y.A. Coding of Sets of Words. In Proceedings of the 2011 Data Compression Conference, Snowbird, UT, USA, 29–31 March 2011. [Google Scholar]
- Ryabko, B. Coding of a source with unknown but ordered probabilities. Probl. Inform. Transm. 1979, 15, 134–138. [Google Scholar]
- Ryabko, B. Comments on: “A source matching approach to finding minimax codes”. IEEE Trans. Inform. Theory 1981, 27, 780–781. [Google Scholar] [CrossRef]
- Shtar’kov, Y.M. Universal sequential coding of single messages. Problemy Peredachi Inf. 1987, 23, 3–17. [Google Scholar]
- Cover, T.M.; Thomas, J.A. Elements of Information Theory; Wiley-Interscience: New York, NY, USA, 2006. [Google Scholar]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the author. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Ryabko, B. Unconditionally Secure Ciphers with a Short Key for a Source with Unknown Statistics. Entropy 2023, 25, 1406. https://doi.org/10.3390/e25101406
Ryabko B. Unconditionally Secure Ciphers with a Short Key for a Source with Unknown Statistics. Entropy. 2023; 25(10):1406. https://doi.org/10.3390/e25101406
Chicago/Turabian StyleRyabko, Boris. 2023. "Unconditionally Secure Ciphers with a Short Key for a Source with Unknown Statistics" Entropy 25, no. 10: 1406. https://doi.org/10.3390/e25101406
APA StyleRyabko, B. (2023). Unconditionally Secure Ciphers with a Short Key for a Source with Unknown Statistics. Entropy, 25(10), 1406. https://doi.org/10.3390/e25101406