Universal Encryption of Individual Sequences Under Maximal Information Leakage
Abstract
:1. Introduction
2. Notation Conventions, Background, and Problem Formulation
2.1. Notation Conventions
2.2. Background
2.2.1. Maximal Leakage of Information
2.2.2. Lempel–Ziv Parsing
2.3. Problem Formulation
3. Main Results
- A few comments are now in order.
- We established both a lower bound and an asymptotically matching upper bound on the information leakage, leading once again to the conclusion that asymptotically optimal performance can be achieved by applying Lempel–Ziv (LZ) compression followed by one-time pad encryption of the compressed bitstream. As discussed in the introduction, together with earlier works, such as [24,25,26], this reinforces the message that one-time pad encryption applied after LZ compression yields an asymptotically optimal cipher system in several important respects. That said, we believe the deeper and more significant contribution of this work lies in the converse theorem (Theorem 1), which shows that the key rate required to securely encrypt an individual sequence cannot be substantially smaller than its LZ complexity minus the permitted normalized maximal information leakage, no matter what encryption strategy is employed.
- Similarly as in [6], there is formally a certain gap between the converse theorem and the achievability scheme in its basic form, when examined from the viewpoint of the number of states, s, relative to n. While s should be small relative to n for the lower bound to be essentially (see Section 2.2 above), the number of states actually needed to implement LZ78 compression for a sequence of length n is basically exponential in n. In [6], the gap is closed in the limit of (after taking the limit ) by subdividing the sequence into blocks and restarting the LZ algorithm at the beginning of every block. A similar comment applies here too in the double limit of achieving .
- As discussed in [26] in a somewhat different context, for an alternative to the use of the LZ78 algorithm, it can be shown that asymptotically optimum performance can also be attained by a universal compression scheme for the class of k-th order Markov sources, where k is chosen to be sufficiently large. In this case, in Theorems 1 and 2 should be replaced by the k-th order empirical entropy of order k, and some redundancy terms should be modified. However, one of these redundancy terms is , which means that in order to compete with the best encrypter with s states, k must be chosen to be significantly larger than , so as to make this term reasonably small.
- It is speculated that it may not be difficult to extend our findings in several directions, including lossy reconstruction, the presence of side information at either parties, the combination of both, and successive refinement systems in accordance to [32]. Other potentially interesting extensions are in broadening the scope of the FSM model to larger classes of machines, including FSMs with counters, shift-register machines with counters, and periodically time-varying FSMs with counters, as was carried out in Section III of [26]. Research in some of these directions will be explored in future studies.
4. Proof of Theorem 1
Funding
Institutional Review Board Statement
Data Availability Statement
Conflicts of Interest
Appendix A. Proof of Equation (23)
References
- Kieffer, J.C.; Yang, E.-H. Sequential Codes, Lossless Compression of Individual Sequences, and Kolmogorov Complexity; Technical Report 1993–3; Information Theory Research Group, University of Minnesota: Minneapolis, MN, USA, 1993. [Google Scholar]
- Yang, E.-H.; Kieffer, J.C. Simple universal lossy data compression schemes derived from the Lempel–Ziv algorithm. IEEE Trans. Inform. Theory 1996, 42, 239–245. [Google Scholar] [CrossRef]
- Ziv, J. Coding theorems for individual sequences. IEEE Trans. Inform. Theory 1978, 24, 405–412. [Google Scholar] [CrossRef]
- Ziv, J. Distortion–rate theory for individual sequences. IEEE Trans. Inform. Theory 1980, 26, 137–143. [Google Scholar] [CrossRef]
- Ziv, J. Fixed-rate encoding of individual sequences with side information. IEEE Trans. Inf. Theory 1984, 30, 348–452. [Google Scholar] [CrossRef]
- Ziv, J.; Lempel, A. Compression of individual sequences via variable-rate coding. IEEE Trans. Inform. Theory 1978, 24, 530–536. [Google Scholar] [CrossRef]
- Seroussi, G. On universal types. IEEE Trans. Inform. Theory 2006, 52, 171–189. [Google Scholar] [CrossRef]
- Ziv, J. Compression, tests for randomness, and estimating the statistical model of an individual sequence. In Sequences: Combinatorics, Compression, Security, and Transmission; Capocelli, R.M., Ed.; Springer Verlag: New York, NY, USA, 1990; pp. 366–373. [Google Scholar]
- Ziv, J.; Merhav, N. A measure of relative entropy between individual sequences with application to universal classification. IEEE Trans. Inform. Theory 1993, 39, 1270–1279. [Google Scholar] [CrossRef]
- Feder, M.; Merhav, N.; Gutman, M. Universal prediction of individual sequences. IEEE Trans. Inform. Theory 1992, 38, 1258–1270. [Google Scholar] [CrossRef]
- Haussler, D.; Kivinen, J.; Warmuth, M.K. Sequential prediction of individual sequences under general loss functions. IEEE Trans. Inform. Theory 1998, 44, 1906–1925. [Google Scholar] [CrossRef]
- Weissman, T.; Merhav, N.; Somekh-Baruch, A. Twofold universal prediction schemes for achieving the finite–state predictability of a noisy individual binary sequence. IEEE Trans. Inform. Theory 2001, 47, 1849–1866. [Google Scholar] [CrossRef]
- Weissman, T.; Ordentlich, E.; Seroussi, G.; Verdú, S.; Weinberger, M.J. Universal denoising: Known channel. IEEE Trans. Inform. Theory 2005, 51, 5–28. [Google Scholar] [CrossRef]
- Lomnitz, Y.; Feder, M. Universal communication over individual channels. IEEE Trans. Inform. Theory 2011, 57, 7333–7358. [Google Scholar] [CrossRef]
- Lomnitz, Y.; Feder, M. Universal communication—Part I: Modulo additive channels. IEEE Trans. Inform. Theory 2013, 59, 5488–5510. [Google Scholar] [CrossRef]
- Shayevitz, O.; Feder, M. Communicating using feedback over a binary channel with arbitrary noise sequence. In Proceedings of the International Symposium on Information Theory, ISIT 2005, Adelaide, Australia, 4–9 September 2005; pp. 1516–1520. [Google Scholar]
- Merhav, N. On Jacob Ziv’s individual-sequence approach to information theory. IEEE BITS Inf. Theory Mag. 2025. submitted. [Google Scholar] [CrossRef]
- Shannon, C.E. Communication theory of secrecy systems. Bell Syst. J. 1949, 28, 656–715. [Google Scholar] [CrossRef]
- Hellman, M.E. An extension of the Shannon theory approach to cryptography. IEEE Trans. Inform. Theory 1997, 23, 289–294. [Google Scholar] [CrossRef]
- Lempel, A. Cryptology in transition. Comput. Surv. 1979, 11, 285–303. [Google Scholar] [CrossRef]
- Liang, Y.; Poor, H.V.; Shamai (Shitz), S. Information theoretic security. Found. Trends Commun. Inf. Theory 2009, 5, 355–580. [Google Scholar] [CrossRef]
- Massey, J.L. An introduction to contemporary cryptology. Proc. IEEE 1988, 76, 533–549. [Google Scholar] [CrossRef]
- Yamamoto, H. Information theory in cryptology. IEICE Trans. 1991, E74, 2456–2464. [Google Scholar]
- Ziv, J. Perfect secrecy for individual sequences. 1978; unpublished work. [Google Scholar]
- Merhav, N. Perfectly secure encryption of individual sequences. IEEE Trans. Inform. Theory 2013, 59, 1302–1310. [Google Scholar] [CrossRef]
- Merhav, N. Refinements and extensions of Ziv’s model of perfect secrecy for individual sequences. Entropy 2024, 26, 503. [Google Scholar] [CrossRef]
- Issa, I.; Wagner, A.B.; Kamath, S. An operational approach to information leakage. IEEE Trans. Inform. Theory 2020, 66, 1625–1657. [Google Scholar] [CrossRef]
- Bloch, M.; Günlü, O.; Yener, A.; Oggier, F.; Poor, H.V.; Sankar, L.; Schaefer, R.F. An overview of information-theoretic security and privacy: Metrics, limits and applications. IEEE J. Sel. Areas Inform. Theory 2021, 2, 5–22. [Google Scholar] [CrossRef]
- Esposito, A.R.; Gastpar, M.; Issa, I. Generalization error bounds via Rényi-, f-divergences and maximal leakage. IEEE Trans. Inform. Theory 2021, 67, 4986–5004. [Google Scholar] [CrossRef]
- Kurri, G.R.; Sankar, L.; Kosut, O. An operational approach to information leakage via generalized gain functions. IEEE Trans. Inform. Theory 2024, 70, 1349–1375. [Google Scholar] [CrossRef]
- Saeidian, S.; Cervia, G.; Oechtering, T.J.; Skoglund, M. Pointwise maximal leakage. IEEE Trans. Inform. Theory 2023, 69, 8054–8080. [Google Scholar] [CrossRef]
- Wu, Z.; Bai, L.; Zhou, L. Successive refinement of Shannon cipher system under under maximal leakage. IEEE Trans. Inform. Theory 2025, 71, 1487–1503. [Google Scholar] [CrossRef]
- Merhav, N. A large-deviations notion of perfect secrecy. IEEE Trans. Inform. Theory 2003, 49, 506–508. [Google Scholar] [CrossRef]
- Plotnik, E.; Weinberger, M.J.; Ziv, J. Upper bounds on the probability of sequences emitted by finite-state sources and on the redundancy of the Lempel-Ziv algorithm. IEEE Trans. Inform. Theory 1992, 38, 66–72. [Google Scholar] [CrossRef]
- Cover, T.M.; Thomas, J.A. Elements of Information Theory; John Wiley & Sons: Hoboken, NJ, USA, 2006. [Google Scholar]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the author. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Merhav, N. Universal Encryption of Individual Sequences Under Maximal Information Leakage. Entropy 2025, 27, 551. https://doi.org/10.3390/e27060551
Merhav N. Universal Encryption of Individual Sequences Under Maximal Information Leakage. Entropy. 2025; 27(6):551. https://doi.org/10.3390/e27060551
Chicago/Turabian StyleMerhav, Neri. 2025. "Universal Encryption of Individual Sequences Under Maximal Information Leakage" Entropy 27, no. 6: 551. https://doi.org/10.3390/e27060551
APA StyleMerhav, N. (2025). Universal Encryption of Individual Sequences Under Maximal Information Leakage. Entropy, 27(6), 551. https://doi.org/10.3390/e27060551