DocumentCode :
3605975
Title :
Universal Hashing for Information-Theoretic Security
Author :
Tyagi, Himanshu ; Vardy, Alexander
Author_Institution :
Indian Inst. of Sci., Bangalore, India
Volume :
103
Issue :
10
fYear :
2015
Firstpage :
1781
Lastpage :
1795
Abstract :
The information-theoretic approach to security entails harnessing the correlated randomness available in nature to establish security. It uses tools from information theory and coding and yields provable security, even against an adversary with unbounded computational power. However, the feasibility of this approach in practice depends on the development of efficiently implementable schemes. In this paper, we review a special class of practical schemes for information-theoretic security that are based on 2-universal hash families. Specific cases of secret key agreement and wiretap coding are considered, and general themes are identified. The scheme presented for wiretap coding is modular and can be implemented easily by including an extra preprocessing layer over the existing transmission codes.
Keywords :
information theory; private key cryptography; information coding; information theory; information-theoretic security; secret key agreement; wiretap coding; Communication channels; Communication system security; Cryptography; Encoding; Noise measurement; Physical layer; Random variables; Receivers; Security; Telecommunication services; 2-universal hash family; Information-theoretic security; modular coding schemes; secret key agreement; wiretap codes;
fLanguage :
English
Journal_Title :
Proceedings of the IEEE
Publisher :
ieee
ISSN :
0018-9219
Type :
jour
DOI :
10.1109/JPROC.2015.2462774
Filename :
7270413
Link To Document :
بازگشت