Perfect Secrecy under Deep Random assumption

نویسنده

  • Thibault de Valroger
چکیده

We present a new idea to design perfectly secure information exchangeprotocol, based on a new form of randomness, called « Deep Randomness »,generated in such a way that probability distribution of the output signal ismade unknowledgeable for an observer. By limiting, thanks to DeepRandomness, the capacity of the opponent observer to perform bayesianinference over public information to estimate private information, we candesign protocols, beyond Shannon limit, enabling two legitimate partners,sharing originally no common private information, to exchange secretinformation with accuracy as close as desired from perfection, andknowledge as close as desired from zero by any unlimitedly poweredopponent. We introduce the Deep Randomness assumption, based on PriorProbability theory developed by Carnap, Cox and Jaynes. Deep Randomassumption gives a rigorous rule to perform bayesian inference underuncertainty situation. We also present a workable example of protocol withproof of perfect secrecy under Deep Random assumption, and we present amethod to generate Deep Randomness from classical computation resources.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Simulations for Deep Random Secrecy Protocol

We present numerical simulations measuring secrecy and efficiency rate of Perfect Secrecy protocol based on Deep Random assumption presented in former article [9]. Those simulations specifically measure the respective error rates of both legitimate partner and eavesdropper experimented during the exchange of a data flow through the protocol. The measurements of the error rates also enable us to...

متن کامل

Towards a Provably Secure DoS-Resilient Key Exchange Protocol with Perfect Forward Secrecy

Just Fast Keying (JFK) is a simple, efficient and secure key exchange protocol proposed by Aiello et al. (ACM TISSEC, 2004). JFK is well known for its novel design features, notably its resistance to denialof-service (DoS) attacks. Using Meadows’ cost-based framework, we identify a new DoS vulnerability in JFK. The JFK protocol is claimed secure in the Canetti-Krawczyk model under the Decisiona...

متن کامل

Guaranteeing Positive Secrecy Capacity with Finite-Rate Feedback using Artificial Noise

While the impact of finite-rate feedback on the capacity of fading channels has been extensively studied in the literature, not much attention has been paid to this problem under secrecy constraint. In this work, we study the ergodic secret capacity of a multiple-input multiple-output multiple-antennaeavesdropper (MIMOME) wiretap channel with quantized channel state information (CSI) at the tra...

متن کامل

Optimal Power Allocation for GSVD-Based Beamforming in the MIMO Wiretap Channel

This paper considers a multiple-input multiple-output (MIMO) Gaussian wiretap channel model, where there exists a transmitter, a legitimate receiver and an eavesdropper, each equipped with multiple antennas. Perfect secrecy is achieved when the transmitter and the legitimate receiver can communicate at some positive rate, while ensuring that the eavesdropper gets zero bits of information. In th...

متن کامل

eCK Secure Single Round ID-based Authenticated Key Exchange Protocols with Master Perfect Forward Secrecy (Extended Version)

Recently, LaMacchia, Lauter and Mityagin proposed the extended Canetti-Krawczyk (eCK) model for Authenticated Key Exchange (AKE) protocols that covers many attacks on existing models. An ID-based AKE protocol with Perfect Forward Secrecy (PFS) (respectively Master Perfect Forward Secrecy (MPFS)) ensures that revelation of the static keys of the parties (respectively the master secret key of the...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • CoRR

دوره abs/1507.08258  شماره 

صفحات  -

تاریخ انتشار 2015