ePrints@IIScePrints@IISc Home | About | Browse | Latest Additions | Advanced Search | Contact | Help

Universal Hashing for Information-Theoretic Security

Tyagi, Himanshu and Vardy, Alexander (2015) Universal Hashing for Information-Theoretic Security. In: PROCEEDINGS OF THE IEEE, 103 (10, SI). pp. 1781-1795.

[img] PDF
Pro_of_the_IEEE_103-10_1781_2015.pdf - Published Version
Restricted to Registered users only

Download (918kB) | Request a copy
Official URL: http://dx.doi.org/10.1109/JPROC.2015.2462774

Abstract

The information-theoretic approach to security entails harnessing the correlated randomness available in nature to establish security. It uses tools from information theory and coding and yields provable security, even against an adversary with unbounded computational power. However, the feasibility of this approach in practice depends on the development of efficiently implementable schemes. In this paper, we review a special class of practical schemes for information-theoretic security that are based on 2-universal hash families. Specific cases of secret key agreement and wiretap coding are considered, and general themes are identified. The scheme presented for wiretap coding is modular and can be implemented easily by including an extra preprocessing layer over the existing transmission codes.

Item Type: Journal Article
Publication: PROCEEDINGS OF THE IEEE
Publisher: IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
Additional Information: Copy right for this article belongs to the IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 445 HOES LANE, PISCATAWAY, NJ 08855-4141 USA
Keywords: Information-theoretic security; modular coding schemes; secret key agreement; wiretap codes; 2-universal hash family
Department/Centre: Division of Electrical Sciences > Electrical Communication Engineering
Date Deposited: 30 Oct 2015 07:11
Last Modified: 30 Oct 2015 07:11
URI: http://eprints.iisc.ac.in/id/eprint/52592

Actions (login required)

View Item View Item