String commitment from unstructured noisy channels
- URL: http://arxiv.org/abs/2501.00281v1
- Date: Tue, 31 Dec 2024 05:28:05 GMT
- Title: String commitment from unstructured noisy channels
- Authors: Jiawei Wu, Masahito Hayashi, Marco Tomamichel,
- Abstract summary: Noisy channels are valuable resources for cryptography, enabling primitives like bit commitment and oblivious transfer.
We present a protocol for string commitment over such channels that is complete, hiding, and binding, and derive its achievable commitment rate.
The commitment rate coincides with previous results when the adversarial channels are the same binary symmetric channel as in the honest case.
- Score: 53.04878543623513
- License:
- Abstract: Noisy channels are valuable resources for cryptography, enabling information-theoretically secure protocols for cryptographic primitives like bit commitment and oblivious transfer. While existing work has primarily considered memoryless channels, we consider more flexible channel resources that a dishonest player can configure arbitrarily within some constraints on their min-entropy. We present a protocol for string commitment over such channels that is complete, hiding, and binding, and derive its achievable commitment rate, demonstrating the possibility of string commitment in noisy channels with a stronger adversarial model. The asymptotic commitment rate coincides with previous results when the adversarial channels are the same binary symmetric channel as in the honest case.
Related papers
- Secure Integrated Sensing and Communication Under Correlated Rayleigh Fading [35.096935840816684]
We consider a secure integrated sensing and communication (ISAC) scenario, in which a signal is transmitted through a state-dependent wiretap channel.
We establish and illustrate an achievable secrecy-distortion region for degraded secure ISAC channels under correlated Rayleigh fading.
arXiv Detail & Related papers (2024-08-30T07:16:55Z) - Security for adversarial wiretap channels [4.383205675898942]
We analyze information-theoretically secure coding schemes which use the inverse of an extractor and an error-correcting code.
We show that this also holds for certain channel types with memory.
arXiv Detail & Related papers (2024-04-02T09:22:40Z) - Semantic Entropy Can Simultaneously Benefit Transmission Efficiency and Channel Security of Wireless Semantic Communications [55.54210451136529]
We propose SemEntropy to explore semantics of data for both adaptive transmission and physical layer encryption.
We show that SemEntropy can keep the semantic accuracy remain 95% with 60% less transmission.
arXiv Detail & Related papers (2024-02-05T12:25:02Z) - Channel Simulation: Finite Blocklengths and Broadcast Channels [13.561997774592667]
We study channel simulation under common randomness assistance in the finite-blocklength regime.
We identify the smooth channel max-information as a linear program one-shot converse on the minimal simulation cost for fixed error tolerance.
arXiv Detail & Related papers (2022-12-22T13:08:55Z) - Short Blocklength Wiretap Channel Codes via Deep Learning: Design and
Performance Evaluation [5.203329540700176]
We design short blocklength codes for the Gaussian wiretap channel under information-theoretic security guarantees.
We handle the reliability constraint via an autoencoder, and handle the secrecy constraint with hash functions.
For blocklengths smaller than or equal to 16, we evaluate through simulations the probability of error at the legitimate receiver.
arXiv Detail & Related papers (2022-06-07T17:52:46Z) - Applicability of Squeezed-and Coherent-State Continuous-Variable Quantum
Key Distribution over Satellite Links [0.0]
We address the applicability of quantum key distribution with continuous-variable coherent and squeezed states over long-distance satellite-based links.
We obtain tight security bounds on the untrusted excess noise on the channel output.
We show that feasible amounts of optimized signal squeezing can substantially improve the applicability of the protocols.
arXiv Detail & Related papers (2021-01-22T18:44:54Z) - Operation-Aware Soft Channel Pruning using Differentiable Masks [51.04085547997066]
We propose a data-driven algorithm, which compresses deep neural networks in a differentiable way by exploiting the characteristics of operations.
We perform extensive experiments and achieve outstanding performance in terms of the accuracy of output networks.
arXiv Detail & Related papers (2020-07-08T07:44:00Z) - Harnessing Wireless Channels for Scalable and Privacy-Preserving
Federated Learning [56.94644428312295]
Wireless connectivity is instrumental in enabling federated learning (FL)
Channel randomnessperturbs each worker inversions model update while multiple workers updates incur significant interference on bandwidth.
In A-FADMM, all workers upload their model updates to the parameter server using a single channel via analog transmissions.
This not only saves communication bandwidth, but also hides each worker's exact model update trajectory from any eavesdropper.
arXiv Detail & Related papers (2020-07-03T16:31:15Z) - Decentralized Learning for Channel Allocation in IoT Networks over
Unlicensed Bandwidth as a Contextual Multi-player Multi-armed Bandit Game [134.88020946767404]
We study a decentralized channel allocation problem in an ad-hoc Internet of Things network underlaying on the spectrum licensed to a primary cellular network.
Our study maps this problem into a contextual multi-player, multi-armed bandit game, and proposes a purely decentralized, three-stage policy learning algorithm through trial-and-error.
arXiv Detail & Related papers (2020-03-30T10:05:35Z) - Semantic Security for Quantum Wiretap Channels [68.24747267214373]
We consider the problem of semantic security via classical-quantum and quantum wiretap channels.
We use explicit constructions to transform a non-secure code into a semantically secure code, achieving capacity by means of biregular irreducible functions.
arXiv Detail & Related papers (2020-01-16T09:55:49Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.