81
Semantic Security in the Presence of Active Adversaries Ziv Goldfeld Joint work with Paul Cuff and Haim Permuter Ben Gurion University Advanced Communications Center Annual Workshop February 22nd, 2016

Semantic Security in the Presence of Active Adversariespeople.ece.cornell.edu/zivg/Talk_Feder.pdfPros: 1 Security versus computationally unlimited eavesdropper. 2 No shared key - Use

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Semantic Security in the Presence of Active Adversariespeople.ece.cornell.edu/zivg/Talk_Feder.pdfPros: 1 Security versus computationally unlimited eavesdropper. 2 No shared key - Use

Semantic Security in the Presence of

Active Adversaries

Ziv GoldfeldJoint work with Paul Cuff and Haim Permuter

Ben Gurion University

Advanced Communications Center Annual Workshop

February 22nd, 2016

Page 2: Semantic Security in the Presence of Active Adversariespeople.ece.cornell.edu/zivg/Talk_Feder.pdfPros: 1 Security versus computationally unlimited eavesdropper. 2 No shared key - Use

Motivation

Information Theoretic Security over Noisy Channels

Ziv Goldfeld Ben Gurion University

Semantic Security vs. Active Adversaries 2

Page 3: Semantic Security in the Presence of Active Adversariespeople.ece.cornell.edu/zivg/Talk_Feder.pdfPros: 1 Security versus computationally unlimited eavesdropper. 2 No shared key - Use

Motivation

Information Theoretic Security over Noisy Channels

Pros:

Ziv Goldfeld Ben Gurion University

Semantic Security vs. Active Adversaries 2

Page 4: Semantic Security in the Presence of Active Adversariespeople.ece.cornell.edu/zivg/Talk_Feder.pdfPros: 1 Security versus computationally unlimited eavesdropper. 2 No shared key - Use

Motivation

Information Theoretic Security over Noisy Channels

Pros:

1 Security versus computationally unlimited eavesdropper.

Ziv Goldfeld Ben Gurion University

Semantic Security vs. Active Adversaries 2

Page 5: Semantic Security in the Presence of Active Adversariespeople.ece.cornell.edu/zivg/Talk_Feder.pdfPros: 1 Security versus computationally unlimited eavesdropper. 2 No shared key - Use

Motivation

Information Theoretic Security over Noisy Channels

Pros:

1 Security versus computationally unlimited eavesdropper.

2 No shared key - Use intrinsic randomness of a noisy channel.

Ziv Goldfeld Ben Gurion University

Semantic Security vs. Active Adversaries 2

Page 6: Semantic Security in the Presence of Active Adversariespeople.ece.cornell.edu/zivg/Talk_Feder.pdfPros: 1 Security versus computationally unlimited eavesdropper. 2 No shared key - Use

Motivation

Information Theoretic Security over Noisy Channels

Pros:

1 Security versus computationally unlimited eavesdropper.

2 No shared key - Use intrinsic randomness of a noisy channel.

Cons:

Ziv Goldfeld Ben Gurion University

Semantic Security vs. Active Adversaries 2

Page 7: Semantic Security in the Presence of Active Adversariespeople.ece.cornell.edu/zivg/Talk_Feder.pdfPros: 1 Security versus computationally unlimited eavesdropper. 2 No shared key - Use

Motivation

Information Theoretic Security over Noisy Channels

Pros:

1 Security versus computationally unlimited eavesdropper.

2 No shared key - Use intrinsic randomness of a noisy channel.

Cons:

1 Eve’s channel assumed to be fully known & constant in time.

Ziv Goldfeld Ben Gurion University

Semantic Security vs. Active Adversaries 2

Page 8: Semantic Security in the Presence of Active Adversariespeople.ece.cornell.edu/zivg/Talk_Feder.pdfPros: 1 Security versus computationally unlimited eavesdropper. 2 No shared key - Use

Motivation

Information Theoretic Security over Noisy Channels

Pros:

1 Security versus computationally unlimited eavesdropper.

2 No shared key - Use intrinsic randomness of a noisy channel.

Cons:

1 Eve’s channel assumed to be fully known & constant in time.

2 Security metrics insufficient for (some) applications.

Ziv Goldfeld Ben Gurion University

Semantic Security vs. Active Adversaries 2

Page 9: Semantic Security in the Presence of Active Adversariespeople.ece.cornell.edu/zivg/Talk_Feder.pdfPros: 1 Security versus computationally unlimited eavesdropper. 2 No shared key - Use

Motivation

Information Theoretic Security over Noisy Channels

Pros:

1 Security versus computationally unlimited eavesdropper.

2 No shared key - Use intrinsic randomness of a noisy channel.

Cons:

1 Eve’s channel assumed to be fully known & constant in time.

2 Security metrics insufficient for (some) applications.

Our Goal: Stronger metric and remove “known channel” assumption.

Ziv Goldfeld Ben Gurion University

Semantic Security vs. Active Adversaries 2

Page 10: Semantic Security in the Presence of Active Adversariespeople.ece.cornell.edu/zivg/Talk_Feder.pdfPros: 1 Security versus computationally unlimited eavesdropper. 2 No shared key - Use

Wiretap Channels - Security Metrics

Ziv Goldfeld Ben Gurion University

Semantic Security vs. Active Adversaries 3

Page 11: Semantic Security in the Presence of Active Adversariespeople.ece.cornell.edu/zivg/Talk_Feder.pdfPros: 1 Security versus computationally unlimited eavesdropper. 2 No shared key - Use

Wiretap Channels and Security MetricsDegraded [Wyner 1975], General [Csiszar-Korner 1978]

U[

1 : 2nR]

∼MEnc

XnQY,Z|X

Y n

Zn

Dec

Eve

M

M

Ziv Goldfeld Ben Gurion University

Semantic Security vs. Active Adversaries 4

Page 12: Semantic Security in the Presence of Active Adversariespeople.ece.cornell.edu/zivg/Talk_Feder.pdfPros: 1 Security versus computationally unlimited eavesdropper. 2 No shared key - Use

Wiretap Channels and Security MetricsDegraded [Wyner 1975], General [Csiszar-Korner 1978]

U[

1 : 2nR]

∼MEnc

XnQY,Z|X

Y n

Zn

Dec

Eve

M

M

{

Cn

}

n∈N- a sequence of (n, R)-codes

Ziv Goldfeld Ben Gurion University

Semantic Security vs. Active Adversaries 4

Page 13: Semantic Security in the Presence of Active Adversariespeople.ece.cornell.edu/zivg/Talk_Feder.pdfPros: 1 Security versus computationally unlimited eavesdropper. 2 No shared key - Use

Wiretap Channels and Security MetricsDegraded [Wyner 1975], General [Csiszar-Korner 1978]

U[

1 : 2nR]

∼MEnc

XnQY,Z|X

Y n

Zn

Dec

Eve

M

M

{

Cn

}

n∈N- a sequence of (n, R)-codes

Weak-Secrecy: 1n

ICn(M ; Zn) −−−→

n→∞0.

Ziv Goldfeld Ben Gurion University

Semantic Security vs. Active Adversaries 4

Page 14: Semantic Security in the Presence of Active Adversariespeople.ece.cornell.edu/zivg/Talk_Feder.pdfPros: 1 Security versus computationally unlimited eavesdropper. 2 No shared key - Use

Wiretap Channels and Security MetricsDegraded [Wyner 1975], General [Csiszar-Korner 1978]

U[

1 : 2nR]

∼MEnc

XnQY,Z|X

Y n

Zn

Dec

Eve

M

M

{

Cn

}

n∈N- a sequence of (n, R)-codes

Weak-Secrecy: 1n

ICn(M ; Zn) −−−→

n→∞0. Only leakage rate vanishes

Ziv Goldfeld Ben Gurion University

Semantic Security vs. Active Adversaries 4

Page 15: Semantic Security in the Presence of Active Adversariespeople.ece.cornell.edu/zivg/Talk_Feder.pdfPros: 1 Security versus computationally unlimited eavesdropper. 2 No shared key - Use

Wiretap Channels and Security MetricsDegraded [Wyner 1975], General [Csiszar-Korner 1978]

U[

1 : 2nR]

∼MEnc

XnQY,Z|X

Y n

Zn

Dec

Eve

M

M

{

Cn

}

n∈N- a sequence of (n, R)-codes

Weak-Secrecy:✭✭

✭✭✭

✭✭✭✭

✭✭1n

ICn(M ; Zn) −−−→

n→∞0 .

Ziv Goldfeld Ben Gurion University

Semantic Security vs. Active Adversaries 4

Page 16: Semantic Security in the Presence of Active Adversariespeople.ece.cornell.edu/zivg/Talk_Feder.pdfPros: 1 Security versus computationally unlimited eavesdropper. 2 No shared key - Use

Wiretap Channels and Security MetricsDegraded [Wyner 1975], General [Csiszar-Korner 1978]

U[

1 : 2nR]

∼MEnc

XnQY,Z|X

Y n

Zn

Dec

Eve

M

M

{

Cn

}

n∈N- a sequence of (n, R)-codes

Weak-Secrecy:✭✭

✭✭✭

✭✭✭✭

✭✭1n

ICn(M ; Zn) −−−→

n→∞0 .

Strong-Secrecy: ICn(M ; Zn) −−−→

n→∞0.

Ziv Goldfeld Ben Gurion University

Semantic Security vs. Active Adversaries 4

Page 17: Semantic Security in the Presence of Active Adversariespeople.ece.cornell.edu/zivg/Talk_Feder.pdfPros: 1 Security versus computationally unlimited eavesdropper. 2 No shared key - Use

Wiretap Channels and Security MetricsDegraded [Wyner 1975], General [Csiszar-Korner 1978]

U[

1 : 2nR]

∼MEnc

XnQY,Z|X

Y n

Zn

Dec

Eve

M

M

{

Cn

}

n∈N- a sequence of (n, R)-codes

Weak-Secrecy:✭✭

✭✭✭

✭✭✭✭

✭✭1n

ICn(M ; Zn) −−−→

n→∞0 .

Strong-Secrecy: ICn(M ; Zn) −−−→

n→∞0. Security only on average

Ziv Goldfeld Ben Gurion University

Semantic Security vs. Active Adversaries 4

Page 18: Semantic Security in the Presence of Active Adversariespeople.ece.cornell.edu/zivg/Talk_Feder.pdfPros: 1 Security versus computationally unlimited eavesdropper. 2 No shared key - Use

Wiretap Channels and Security MetricsDegraded [Wyner 1975], General [Csiszar-Korner 1978]

U[

1 : 2nR]

∼MEnc

XnQY,Z|X

Y n

Zn

Dec

Eve

M

M

{

Cn

}

n∈N- a sequence of (n, R)-codes

Weak-Secrecy:✭✭

✭✭✭

✭✭✭✭

✭✭1n

ICn(M ; Zn) −−−→

n→∞0 .

Strong-Secrecy:✭

✭✭✭✭

✭✭✭

✭✭

ICn(M ; Zn) −−−→

n→∞0 .

Ziv Goldfeld Ben Gurion University

Semantic Security vs. Active Adversaries 4

Page 19: Semantic Security in the Presence of Active Adversariespeople.ece.cornell.edu/zivg/Talk_Feder.pdfPros: 1 Security versus computationally unlimited eavesdropper. 2 No shared key - Use

Wiretap Channels and Security MetricsDegraded [Wyner 1975], General [Csiszar-Korner 1978]

U[

1 : 2nR]

∼MEnc

XnQY,Z|X

Y n

Zn

Dec

Eve

M

M

{

Cn

}

n∈N- a sequence of (n, R)-codes

Weak-Secrecy:✭✭

✭✭✭

✭✭✭✭

✭✭1n

ICn(M ; Zn) −−−→

n→∞0 .

Strong-Secrecy:✭

✭✭✭✭

✭✭✭

✭✭

ICn(M ; Zn) −−−→

n→∞0 .

Semantic Security:

Ziv Goldfeld Ben Gurion University

Semantic Security vs. Active Adversaries 4

Page 20: Semantic Security in the Presence of Active Adversariespeople.ece.cornell.edu/zivg/Talk_Feder.pdfPros: 1 Security versus computationally unlimited eavesdropper. 2 No shared key - Use

Wiretap Channels and Security MetricsDegraded [Wyner 1975], General [Csiszar-Korner 1978]

U[

1 : 2nR]

∼MEnc

XnQY,Z|X

Y n

Zn

Dec

Eve

M

M

{

Cn

}

n∈N- a sequence of (n, R)-codes

Weak-Secrecy:✭✭

✭✭✭

✭✭✭✭

✭✭1n

ICn(M ; Zn) −−−→

n→∞0 .

Strong-Secrecy:✭

✭✭✭✭

✭✭✭

✭✭

ICn(M ; Zn) −−−→

n→∞0 .

Semantic Security: [Bellare-Tessaro-Vardy 2012]

max

PM

ICn(M ;Zn) −−−→

n→∞0.

Ziv Goldfeld Ben Gurion University

Semantic Security vs. Active Adversaries 4

Page 21: Semantic Security in the Presence of Active Adversariespeople.ece.cornell.edu/zivg/Talk_Feder.pdfPros: 1 Security versus computationally unlimited eavesdropper. 2 No shared key - Use

Wiretap Channels and Security MetricsDegraded [Wyner 1975], General [Csiszar-Korner 1978]

U[

1 : 2nR]

∼MEnc

XnQY,Z|X

Y n

Zn

Dec

Eve

M

M

{

Cn

}

n∈N- a sequence of (n, R)-codes

Weak-Secrecy:✭✭

✭✭✭

✭✭✭✭

✭✭1n

ICn(M ; Zn) −−−→

n→∞0 .

Strong-Secrecy:✭

✭✭✭✭

✭✭✭

✭✭

ICn(M ; Zn) −−−→

n→∞0 .

Semantic Security: [Bellare-Tessaro-Vardy 2012]

max

PM

ICn(M ;Zn) −−−→

n→∞0.

⋆ A single code must work well for all message PMFs ⋆

Ziv Goldfeld Ben Gurion University

Semantic Security vs. Active Adversaries 4

Page 22: Semantic Security in the Presence of Active Adversariespeople.ece.cornell.edu/zivg/Talk_Feder.pdfPros: 1 Security versus computationally unlimited eavesdropper. 2 No shared key - Use

A Stronger Soft-Covering Lemma

Ziv Goldfeld Ben Gurion University

Semantic Security vs. Active Adversaries 5

Page 23: Semantic Security in the Presence of Active Adversariespeople.ece.cornell.edu/zivg/Talk_Feder.pdfPros: 1 Security versus computationally unlimited eavesdropper. 2 No shared key - Use

Soft-Covering - Setup

Ziv Goldfeld Ben Gurion University

Semantic Security vs. Active Adversaries 6

WCodebook

Un

QV |UV n

Unif[

1 : 2nR]

Page 24: Semantic Security in the Presence of Active Adversariespeople.ece.cornell.edu/zivg/Talk_Feder.pdfPros: 1 Security versus computationally unlimited eavesdropper. 2 No shared key - Use

Soft-Covering - Setup

Ziv Goldfeld Ben Gurion University

Semantic Security vs. Active Adversaries 6

WCodebook

Un

QV |UV n ← Resemble i.i.d.

Unif[

1 : 2nR]

Page 25: Semantic Security in the Presence of Active Adversariespeople.ece.cornell.edu/zivg/Talk_Feder.pdfPros: 1 Security versus computationally unlimited eavesdropper. 2 No shared key - Use

Soft-Covering - Setup

Random Codebook: Cn ={

Un(w)}

w

iid∼ Qn

U .

Ziv Goldfeld Ben Gurion University

Semantic Security vs. Active Adversaries 6

WCodebook

Un

QV |UV n ← Resemble i.i.d.

Unif[

1 : 2nR]

Page 26: Semantic Security in the Presence of Active Adversariespeople.ece.cornell.edu/zivg/Talk_Feder.pdfPros: 1 Security versus computationally unlimited eavesdropper. 2 No shared key - Use

Soft-Covering - Setup

Random Codebook: Cn ={

Un(w)}

w

iid∼ Qn

U .

Ziv Goldfeld Ben Gurion University

Semantic Security vs. Active Adversaries 6

WCode Cn

Un

QV |UV n ← Resemble i.i.d.

Unif[

1 : 2nR]

Page 27: Semantic Security in the Presence of Active Adversariespeople.ece.cornell.edu/zivg/Talk_Feder.pdfPros: 1 Security versus computationally unlimited eavesdropper. 2 No shared key - Use

Soft-Covering - Setup

Random Codebook: Cn ={

Un(w)}

w

iid∼ Qn

U .

Induced Output Distribution: Codebook Cn =⇒ V n ∼ P(Cn)V n .

Ziv Goldfeld Ben Gurion University

Semantic Security vs. Active Adversaries 6

WCode Cn

Un

QV |UV n ∼ P

(Cn)V n

Unif[

1 : 2nR]

Page 28: Semantic Security in the Presence of Active Adversariespeople.ece.cornell.edu/zivg/Talk_Feder.pdfPros: 1 Security versus computationally unlimited eavesdropper. 2 No shared key - Use

Soft-Covering - Setup

Random Codebook: Cn ={

Un(w)}

w

iid∼ Qn

U .

Induced Output Distribution: Codebook Cn =⇒ V n ∼ P(Cn)V n .

Target IID Distribution: QnV marginal of Qn

U QnV |U .

Ziv Goldfeld Ben Gurion University

Semantic Security vs. Active Adversaries 6

WCode Cn

Un

QV |UV n ∼ P

(Cn)V n

Unif[

1 : 2nR]

Page 29: Semantic Security in the Presence of Active Adversariespeople.ece.cornell.edu/zivg/Talk_Feder.pdfPros: 1 Security versus computationally unlimited eavesdropper. 2 No shared key - Use

Soft-Covering - Setup

Random Codebook: Cn ={

Un(w)}

w

iid∼ Qn

U .

Induced Output Distribution: Codebook Cn =⇒ V n ∼ P(Cn)V n .

Target IID Distribution: QnV marginal of Qn

U QnV |U .

Ziv Goldfeld Ben Gurion University

Semantic Security vs. Active Adversaries 6

WCode Cn

Un

QV |UV n ∼ P

(Cn)V n ≈ Qn

V

Unif[

1 : 2nR]

Page 30: Semantic Security in the Presence of Active Adversariespeople.ece.cornell.edu/zivg/Talk_Feder.pdfPros: 1 Security versus computationally unlimited eavesdropper. 2 No shared key - Use

Soft-Covering - Setup

Random Codebook: Cn ={

Un(w)}

w

iid∼ Qn

U .

Induced Output Distribution: Codebook Cn =⇒ V n ∼ P(Cn)V n .

Target IID Distribution: QnV marginal of Qn

U QnV |U .

⋆ Goal: Choose R (codebook size) s.t. P(Cn)V n ≈ Qn

V ⋆

Ziv Goldfeld Ben Gurion University

Semantic Security vs. Active Adversaries 6

WCode Cn

Un

QV |UV n ∼ P

(Cn)V n ≈ Qn

V

Unif[

1 : 2nR]

Page 31: Semantic Security in the Presence of Active Adversariespeople.ece.cornell.edu/zivg/Talk_Feder.pdfPros: 1 Security versus computationally unlimited eavesdropper. 2 No shared key - Use

Soft-Covering - Results

R > IQ(U ;V ) =⇒ P(Cn)V n ≈ Qn

V

Ziv Goldfeld Ben Gurion University

Semantic Security vs. Active Adversaries 7

WCode Cn

Un

QV |UV n ∼ P

(Cn)V n ≈ Qn

V

Unif[

1 : 2nR]

Page 32: Semantic Security in the Presence of Active Adversariespeople.ece.cornell.edu/zivg/Talk_Feder.pdfPros: 1 Security versus computationally unlimited eavesdropper. 2 No shared key - Use

Soft-Covering - Results

R > IQ(U ;V ) =⇒ P(Cn)V n ≈ Qn

V

Wyner 1975: ECn

1n

D(

P(Cn)V n

∣QnV

)

−−−→n→∞

0.

Ziv Goldfeld Ben Gurion University

Semantic Security vs. Active Adversaries 7

WCode Cn

Un

QV |UV n ∼ P

(Cn)V n ≈ Qn

V

Unif[

1 : 2nR]

Page 33: Semantic Security in the Presence of Active Adversariespeople.ece.cornell.edu/zivg/Talk_Feder.pdfPros: 1 Security versus computationally unlimited eavesdropper. 2 No shared key - Use

Soft-Covering - Results

R > IQ(U ;V ) =⇒ P(Cn)V n ≈ Qn

V

Wyner 1975: ECn

1n

D(

P(Cn)V n

∣QnV

)

−−−→n→∞

0.

Han-Verdu 1993: ECn

∣P(Cn)V n −Qn

V

TV−−−→n→∞

0.

Ziv Goldfeld Ben Gurion University

Semantic Security vs. Active Adversaries 7

WCode Cn

Un

QV |UV n ∼ P

(Cn)V n ≈ Qn

V

Unif[

1 : 2nR]

Page 34: Semantic Security in the Presence of Active Adversariespeople.ece.cornell.edu/zivg/Talk_Feder.pdfPros: 1 Security versus computationally unlimited eavesdropper. 2 No shared key - Use

Soft-Covering - Results

R > IQ(U ;V ) =⇒ P(Cn)V n ≈ Qn

V

Wyner 1975: ECn

1n

D(

P(Cn)V n

∣QnV

)

−−−→n→∞

0.

Han-Verdu 1993: ECn

∣P(Cn)V n −Qn

V

TV−−−→n→∞

0.

◮ Also provided converse.

Ziv Goldfeld Ben Gurion University

Semantic Security vs. Active Adversaries 7

WCode Cn

Un

QV |UV n ∼ P

(Cn)V n ≈ Qn

V

Unif[

1 : 2nR]

Page 35: Semantic Security in the Presence of Active Adversariespeople.ece.cornell.edu/zivg/Talk_Feder.pdfPros: 1 Security versus computationally unlimited eavesdropper. 2 No shared key - Use

Soft-Covering - Results

R > IQ(U ;V ) =⇒ P(Cn)V n ≈ Qn

V

Wyner 1975: ECn

1n

D(

P(Cn)V n

∣QnV

)

−−−→n→∞

0.

Han-Verdu 1993: ECn

∣P(Cn)V n −Qn

V

TV−−−→n→∞

0.

◮ Also provided converse.

Hou-Kramer 2014: ECnD

(

P(Cn)V n

∣QnV

)

−−−→n→∞

0.

Ziv Goldfeld Ben Gurion University

Semantic Security vs. Active Adversaries 7

WCode Cn

Un

QV |UV n ∼ P

(Cn)V n ≈ Qn

V

Unif[

1 : 2nR]

Page 36: Semantic Security in the Presence of Active Adversariespeople.ece.cornell.edu/zivg/Talk_Feder.pdfPros: 1 Security versus computationally unlimited eavesdropper. 2 No shared key - Use

A Stronger Soft-Covering Lemma

Theorem

If R > IQ(U ;V ) and |V| < ∞, then there exists γ1, γ2 > 0 s.t.

PCn

(

D(

P(Cn)V n

∣QnV

)

> e−nγ1

)

≤ e−enγ2

for n sufficiently large.

Ziv Goldfeld Ben Gurion University

Semantic Security vs. Active Adversaries 8

WCode Cn

Un

QV |UV n ∼ P

(Cn)V n ≈ Qn

V

Unif[

1 : 2nR]

Page 37: Semantic Security in the Presence of Active Adversariespeople.ece.cornell.edu/zivg/Talk_Feder.pdfPros: 1 Security versus computationally unlimited eavesdropper. 2 No shared key - Use

Wiretap Channels of Type II

Ziv Goldfeld Ben Gurion University

Semantic Security vs. Active Adversaries 9

Page 38: Semantic Security in the Presence of Active Adversariespeople.ece.cornell.edu/zivg/Talk_Feder.pdfPros: 1 Security versus computationally unlimited eavesdropper. 2 No shared key - Use

Wiretap Channels of Type II - Definition[Ozarow-Wyner 1984]

mEnc

S ⊆ [1 :n], |S|= µ

Zi =

{

Xi , i ∈ S

?, i /∈ S

Xn

QY |XY n

Zn

Dec

Eve

m

m

Ziv Goldfeld Ben Gurion University

Semantic Security vs. Active Adversaries 10

Page 39: Semantic Security in the Presence of Active Adversariespeople.ece.cornell.edu/zivg/Talk_Feder.pdfPros: 1 Security versus computationally unlimited eavesdropper. 2 No shared key - Use

Wiretap Channels of Type II - Definition[Ozarow-Wyner 1984]

mEnc

S ⊆ [1 :n], |S|= µ

Zi =

{

Xi , i ∈ S

?, i /∈ S

Xn

QY |XY n

Zn

Dec

Eve

m

m

Eavesdropper: Can observe a subset S ⊆ [1 : n] of size µ = ⌊αn⌋,α ∈ [0,1], of transmitted symbols.

Ziv Goldfeld Ben Gurion University

Semantic Security vs. Active Adversaries 10

Page 40: Semantic Security in the Presence of Active Adversariespeople.ece.cornell.edu/zivg/Talk_Feder.pdfPros: 1 Security versus computationally unlimited eavesdropper. 2 No shared key - Use

Wiretap Channels of Type II - Definition[Ozarow-Wyner 1984]

mEnc

S ⊆ [1 :n], |S|= µ

Zi =

{

Xi , i ∈ S

?, i /∈ S

Xn

QY |XY n

Zn

Dec

Eve

m

m

Eavesdropper: Can observe a subset S ⊆ [1 : n] of size µ = ⌊αn⌋,α ∈ [0,1], of transmitted symbols.

Transmitted:

Ziv Goldfeld Ben Gurion University

Semantic Security vs. Active Adversaries 10

0 0 1 0 1 1 1 0 1 0 n = 10 α = 0.63

Page 41: Semantic Security in the Presence of Active Adversariespeople.ece.cornell.edu/zivg/Talk_Feder.pdfPros: 1 Security versus computationally unlimited eavesdropper. 2 No shared key - Use

Wiretap Channels of Type II - Definition[Ozarow-Wyner 1984]

mEnc

S ⊆ [1 :n], |S|= µ

Zi =

{

Xi , i ∈ S

?, i /∈ S

Xn

QY |XY n

Zn

Dec

Eve

m

m

Eavesdropper: Can observe a subset S ⊆ [1 : n] of size µ = ⌊αn⌋,α ∈ [0,1], of transmitted symbols.

Transmitted:

Observed:

Ziv Goldfeld Ben Gurion University

Semantic Security vs. Active Adversaries 10

0 0 1 0 1 1 1 0 1 0

? ? ? 1 1 ? 1 00 1

n = 10 α = 0.63

Page 42: Semantic Security in the Presence of Active Adversariespeople.ece.cornell.edu/zivg/Talk_Feder.pdfPros: 1 Security versus computationally unlimited eavesdropper. 2 No shared key - Use

Wiretap Channels of Type II - Definition[Ozarow-Wyner 1984]

mEnc

S ⊆ [1 :n], |S|= µ

Zi =

{

Xi , i ∈ S

?, i /∈ S

Xn

QY |XY n

Zn

Dec

Eve

m

m

Eavesdropper: Can observe a subset S ⊆ [1 : n] of size µ = ⌊αn⌋,α ∈ [0,1], of transmitted symbols.

Transmitted:

Observed:

⋆ Ensure security versus all possible choices of S ⋆

Ziv Goldfeld Ben Gurion University

Semantic Security vs. Active Adversaries 10

0 0 1 0 1 1 1 0 1 0

? ? ? 1 1 ? 1 00 1

n = 10 α = 0.63

Page 43: Semantic Security in the Presence of Active Adversariespeople.ece.cornell.edu/zivg/Talk_Feder.pdfPros: 1 Security versus computationally unlimited eavesdropper. 2 No shared key - Use

Wiretap Channels of Type II - Past Results[Ozarow-Wyner 1984]

mEnc

S ⊆ [1 :n], |S|= µ

Zi =

{

Xi , i ∈ S

?, i /∈ S

Xn

QY |XY n

Zn

Dec

Eve

m

m

Ozarow-Wyner 1984: Noiseless main channel

Ziv Goldfeld Ben Gurion University

Semantic Security vs. Active Adversaries 11

Page 44: Semantic Security in the Presence of Active Adversariespeople.ece.cornell.edu/zivg/Talk_Feder.pdfPros: 1 Security versus computationally unlimited eavesdropper. 2 No shared key - Use

Wiretap Channels of Type II - Past Results[Ozarow-Wyner 1984]

mEnc

S ⊆ [1 :n], |S|= µ

Zi =

{

Xi , i ∈ S

?, i /∈ S

Xn

QY |XY n

Zn

Dec

Eve

m

m

Ozarow-Wyner 1984: Noiseless main channel◮ Rate equivocation region.

Ziv Goldfeld Ben Gurion University

Semantic Security vs. Active Adversaries 11

Page 45: Semantic Security in the Presence of Active Adversariespeople.ece.cornell.edu/zivg/Talk_Feder.pdfPros: 1 Security versus computationally unlimited eavesdropper. 2 No shared key - Use

Wiretap Channels of Type II - Past Results[Ozarow-Wyner 1984]

mEnc

S ⊆ [1 :n], |S|= µ

Zi =

{

Xi , i ∈ S

?, i /∈ S

Xn

QY |XY n

Zn

Dec

Eve

m

m

Ozarow-Wyner 1984: Noiseless main channel◮ Rate equivocation region.◮ Coset coding.

Ziv Goldfeld Ben Gurion University

Semantic Security vs. Active Adversaries 11

Page 46: Semantic Security in the Presence of Active Adversariespeople.ece.cornell.edu/zivg/Talk_Feder.pdfPros: 1 Security versus computationally unlimited eavesdropper. 2 No shared key - Use

Wiretap Channels of Type II - Past Results[Ozarow-Wyner 1984]

mEnc

S ⊆ [1 :n], |S|= µ

Zi =

{

Xi , i ∈ S

?, i /∈ S

Xn

QY |XY n

Zn

Dec

Eve

m

m

Ozarow-Wyner 1984: Noiseless main channel◮ Rate equivocation region.◮ Coset coding.

Nafea-Yener 2015: Noisy main channel

Ziv Goldfeld Ben Gurion University

Semantic Security vs. Active Adversaries 11

Page 47: Semantic Security in the Presence of Active Adversariespeople.ece.cornell.edu/zivg/Talk_Feder.pdfPros: 1 Security versus computationally unlimited eavesdropper. 2 No shared key - Use

Wiretap Channels of Type II - Past Results[Ozarow-Wyner 1984]

mEnc

S ⊆ [1 :n], |S|= µ

Zi =

{

Xi , i ∈ S

?, i /∈ S

Xn

QY |XY n

Zn

Dec

Eve

m

m

Ozarow-Wyner 1984: Noiseless main channel◮ Rate equivocation region.◮ Coset coding.

Nafea-Yener 2015: Noisy main channel◮ Built on coset code construction.

Ziv Goldfeld Ben Gurion University

Semantic Security vs. Active Adversaries 11

Page 48: Semantic Security in the Presence of Active Adversariespeople.ece.cornell.edu/zivg/Talk_Feder.pdfPros: 1 Security versus computationally unlimited eavesdropper. 2 No shared key - Use

Wiretap Channels of Type II - Past Results[Ozarow-Wyner 1984]

mEnc

S ⊆ [1 :n], |S|= µ

Zi =

{

Xi , i ∈ S

?, i /∈ S

Xn

QY |XY n

Zn

Dec

Eve

m

m

Ozarow-Wyner 1984: Noiseless main channel◮ Rate equivocation region.◮ Coset coding.

Nafea-Yener 2015: Noisy main channel◮ Built on coset code construction.◮ Lower & upper bounds - Not match in general.

Ziv Goldfeld Ben Gurion University

Semantic Security vs. Active Adversaries 11

Page 49: Semantic Security in the Presence of Active Adversariespeople.ece.cornell.edu/zivg/Talk_Feder.pdfPros: 1 Security versus computationally unlimited eavesdropper. 2 No shared key - Use

Wiretap Channels of Type II - SS-Capacity

Ziv Goldfeld Ben Gurion University

Semantic Security vs. Active Adversaries 12

Semantic Security:

Page 50: Semantic Security in the Presence of Active Adversariespeople.ece.cornell.edu/zivg/Talk_Feder.pdfPros: 1 Security versus computationally unlimited eavesdropper. 2 No shared key - Use

Wiretap Channels of Type II - SS-Capacity

Ziv Goldfeld Ben Gurion University

Semantic Security vs. Active Adversaries 12

Semantic Security: maxPM ,S:|S|=µ

ICn(M ; Zn) −−−→

n→∞0.

Page 51: Semantic Security in the Presence of Active Adversariespeople.ece.cornell.edu/zivg/Talk_Feder.pdfPros: 1 Security versus computationally unlimited eavesdropper. 2 No shared key - Use

Wiretap Channels of Type II - SS-Capacity

Theorem

For any α ∈ [0, 1]

C(II)Semantic(α) = C

(II)Weak(α) = max

QU,X

[

I(U ; Y )− αI(U ; X)]

Ziv Goldfeld Ben Gurion University

Semantic Security vs. Active Adversaries 12

Semantic Security: maxPM ,S:|S|=µ

ICn(M ; Zn) −−−→

n→∞0.

Page 52: Semantic Security in the Presence of Active Adversariespeople.ece.cornell.edu/zivg/Talk_Feder.pdfPros: 1 Security versus computationally unlimited eavesdropper. 2 No shared key - Use

Wiretap Channels of Type II - SS-Capacity

Theorem

For any α ∈ [0, 1]

C(II)Semantic(α) = C

(II)Weak(α) = max

QU,X

[

I(U ;Y )−αI(U ;X)]

RHS is the secrecy-capacity of WTC I with erasure DMC to Eve.

Ziv Goldfeld Ben Gurion University

Semantic Security vs. Active Adversaries 12

Semantic Security: maxPM ,S:|S|=µ

ICn(M ; Zn) −−−→

n→∞0.

Page 53: Semantic Security in the Presence of Active Adversariespeople.ece.cornell.edu/zivg/Talk_Feder.pdfPros: 1 Security versus computationally unlimited eavesdropper. 2 No shared key - Use

Wiretap Channels of Type II - SS-Capacity

Theorem

For any α ∈ [0, 1]

C(II)Semantic(α) = C

(II)Weak(α) = max

QU,X

[

I(U ; Y )− αI(U ; X)]

RHS is the secrecy-capacity of WTC I with erasure DMC to Eve.

Standard (erasure) wiretap code & Stronger tools for analysis.

Ziv Goldfeld Ben Gurion University

Semantic Security vs. Active Adversaries 12

Semantic Security: maxPM ,S:|S|=µ

ICn(M ; Zn) −−−→

n→∞0.

Page 54: Semantic Security in the Presence of Active Adversariespeople.ece.cornell.edu/zivg/Talk_Feder.pdfPros: 1 Security versus computationally unlimited eavesdropper. 2 No shared key - Use

Wiretap Channels of Type II - SS-Capacity

Theorem

For any α ∈ [0, 1]

C(II)Semantic(α) = C

(II)Weak(α) = max

QU,X

[

I(U ; Y )− αI(U ; X)]

RHS is the secrecy-capacity of WTC I with erasure DMC to Eve.

Standard (erasure) wiretap code & Stronger tools for analysis.

Practical implementations of binary erasure wiretap codes exist.

Ziv Goldfeld Ben Gurion University

Semantic Security vs. Active Adversaries 12

Semantic Security: maxPM ,S:|S|=µ

ICn(M ; Zn) −−−→

n→∞0.

Page 55: Semantic Security in the Presence of Active Adversariespeople.ece.cornell.edu/zivg/Talk_Feder.pdfPros: 1 Security versus computationally unlimited eavesdropper. 2 No shared key - Use

WTC II SS-Capacity - Achievability for U=X

1 Wiretap Code:

Ziv Goldfeld Ben Gurion University

Semantic Security vs. Active Adversaries 13

Page 56: Semantic Security in the Presence of Active Adversariespeople.ece.cornell.edu/zivg/Talk_Feder.pdfPros: 1 Security versus computationally unlimited eavesdropper. 2 No shared key - Use

WTC II SS-Capacity - Achievability for U=X

1 Wiretap Code:

◮ W ∼ Unif[

1 : 2nR]

.

Ziv Goldfeld Ben Gurion University

Semantic Security vs. Active Adversaries 13

Page 57: Semantic Security in the Presence of Active Adversariespeople.ece.cornell.edu/zivg/Talk_Feder.pdfPros: 1 Security versus computationally unlimited eavesdropper. 2 No shared key - Use

WTC II SS-Capacity - Achievability for U=X

1 Wiretap Code:

◮ W ∼ Unif[

1 : 2nR]

.

◮ Cn ={

Xn(m, w)}

m,w

iid∼ Qn

X

Ziv Goldfeld Ben Gurion University

Semantic Security vs. Active Adversaries 13

m = 1 m = 2 m = 2nR

. . .

w = 1

w = 2nR

......

...

...

n

Page 58: Semantic Security in the Presence of Active Adversariespeople.ece.cornell.edu/zivg/Talk_Feder.pdfPros: 1 Security versus computationally unlimited eavesdropper. 2 No shared key - Use

WTC II SS-Capacity - Achievability for U=X

1 Wiretap Code:

◮ W ∼ Unif[

1 : 2nR]

.

◮ Cn ={

Xn(m, w)}

m,w

iid∼ Qn

X

2 Preliminary Step: maxPM ,S:|S|=µ

ICn(M ; Zn) ≤ max

m,S:|S|=µ

D(

P(Cn,S)Zµ|M=m

∣QµZ

)

Ziv Goldfeld Ben Gurion University

Semantic Security vs. Active Adversaries 13

m = 1 m = 2 m = 2nR

. . .

w = 1

w = 2nR

......

...

...

n

Page 59: Semantic Security in the Presence of Active Adversariespeople.ece.cornell.edu/zivg/Talk_Feder.pdfPros: 1 Security versus computationally unlimited eavesdropper. 2 No shared key - Use

WTC II SS-Capacity - Achievability for U=X

1 Wiretap Code:

◮ W ∼ Unif[

1 : 2nR]

.

◮ Cn ={

Xn(m, w)}

m,w

iid∼ Qn

X

2 Preliminary Step: maxPM ,S:|S|=µ

ICn(M ; Zn) ≤ max

m,S:|S|=µ

D(

P(Cn,S)Zµ|M=m

∣QµZ

)

Ziv Goldfeld Ben Gurion University

Semantic Security vs. Active Adversaries 13

m = 1 m = 2 m = 2nR

. . .

w = 1

w = 2nR

......

...

...

n

Page 60: Semantic Security in the Presence of Active Adversariespeople.ece.cornell.edu/zivg/Talk_Feder.pdfPros: 1 Security versus computationally unlimited eavesdropper. 2 No shared key - Use

WTC II SS-Capacity - Achievability for U=X

1 Wiretap Code:

◮ W ∼ Unif[

1 : 2nR]

.

◮ Cn ={

Xn(m, w)}

m,w

iid∼ Qn

X

2 Preliminary Step: maxPM ,S:|S|=µ

ICn(M ; Zn) ≤ max

m,S:|S|=µ

D(

P(Cn,S)Zµ|M=m

∣QµZ

)

3 Union Bound & Stronger SCL:

Ziv Goldfeld Ben Gurion University

Semantic Security vs. Active Adversaries 13

m = 1 m = 2 m = 2nR

. . .

w = 1

w = 2nR

......

...

...

n

Page 61: Semantic Security in the Presence of Active Adversariespeople.ece.cornell.edu/zivg/Talk_Feder.pdfPros: 1 Security versus computationally unlimited eavesdropper. 2 No shared key - Use

WTC II SS-Capacity - Achievability for U=X

1 Wiretap Code:

◮ W ∼ Unif[

1 : 2nR]

.

◮ Cn ={

Xn(m, w)}

m,w

iid∼ Qn

X

2 Preliminary Step: maxPM ,S:|S|=µ

ICn(M ; Zn) ≤ max

m,S:|S|=µ

D(

P(Cn,S)Zµ|M=m

∣QµZ

)

3 Union Bound & Stronger SCL:

Ziv Goldfeld Ben Gurion University

Semantic Security vs. Active Adversaries 13

m = 1 m = 2 m = 2nR

. . .

w = 1

w = 2nR

......

...

...

n

P

(

{

maxPM ,S

ICn(M ; Zn) ≤ e−nγ1

}c)

Page 62: Semantic Security in the Presence of Active Adversariespeople.ece.cornell.edu/zivg/Talk_Feder.pdfPros: 1 Security versus computationally unlimited eavesdropper. 2 No shared key - Use

WTC II SS-Capacity - Achievability for U=X

1 Wiretap Code:

◮ W ∼ Unif[

1 : 2nR]

.

◮ Cn ={

Xn(m, w)}

m,w

iid∼ Qn

X

2 Preliminary Step: maxPM ,S:|S|=µ

ICn(M ; Zn) ≤ max

m,S:|S|=µ

D(

P(Cn,S)Zµ|M=m

∣QµZ

)

3 Union Bound & Stronger SCL:

Ziv Goldfeld Ben Gurion University

Semantic Security vs. Active Adversaries 13

m = 1 m = 2 m = 2nR

. . .

w = 1

w = 2nR

......

...

...

n

P

(

{

maxPM ,S

ICn(M ; Zn) ≤ e−nγ1

}c)

≤P

(

maxm,S

D(

P(Cn,S)Zµ|M=m

∣QµZ

)

> e−nγ1

)

Page 63: Semantic Security in the Presence of Active Adversariespeople.ece.cornell.edu/zivg/Talk_Feder.pdfPros: 1 Security versus computationally unlimited eavesdropper. 2 No shared key - Use

WTC II SS-Capacity - Achievability for U=X

1 Wiretap Code:

◮ W ∼ Unif[

1 : 2nR]

.

◮ Cn ={

Xn(m, w)}

m,w

iid∼ Qn

X

2 Preliminary Step: maxPM ,S:|S|=µ

ICn(M ; Zn) ≤ max

m,S:|S|=µ

D(

P(Cn,S)Zµ|M=m

∣QµZ

)

3 Union Bound & Stronger SCL:

Ziv Goldfeld Ben Gurion University

Semantic Security vs. Active Adversaries 13

m = 1 m = 2 m = 2nR

. . .

w = 1

w = 2nR

......

...

...

n

P

(

{

maxPM ,S

ICn(M ; Zn) ≤ e−nγ1

}c)

≤P

(

maxm,S

D(

P(Cn,S)Zµ|M=m

∣QµZ

)

> e−nγ1

)

≤∑

m,S

P

(

D(

P(Cn,S)Zµ|M=m

∣QµZ

)

> e−nγ1

)

Page 64: Semantic Security in the Presence of Active Adversariespeople.ece.cornell.edu/zivg/Talk_Feder.pdfPros: 1 Security versus computationally unlimited eavesdropper. 2 No shared key - Use

WTC II SS-Capacity - Achievability for U=X

1 Wiretap Code:

◮ W ∼ Unif[

1 : 2nR]

.

◮ Cn ={

Xn(m, w)}

m,w

iid∼ Qn

X

2 Preliminary Step: maxPM ,S:|S|=µ

ICn(M ; Zn) ≤ max

m,S:|S|=µ

D(

P(Cn,S)Zµ|M=m

∣QµZ

)

3 Union Bound & Stronger SCL:

Ziv Goldfeld Ben Gurion University

Semantic Security vs. Active Adversaries 13

m = 1 m = 2 m = 2nR

. . .

w = 1

w = 2nR

......

...

...

n

P

(

{

maxPM ,S

ICn(M ; Zn) ≤ e−nγ1

}c)

≤P

(

maxm,S

D(

P(Cn,S)Zµ|M=m

∣QµZ

)

> e−nγ1

)

≤∑

m,S

P

(

D(

P(Cn,S)Zµ|M=m

∣QµZ

)

>e−nγ1

)

Page 65: Semantic Security in the Presence of Active Adversariespeople.ece.cornell.edu/zivg/Talk_Feder.pdfPros: 1 Security versus computationally unlimited eavesdropper. 2 No shared key - Use

WTC II SS-Capacity - Achievability for U=X

1 Wiretap Code:

◮ W ∼ Unif[

1 : 2nR]

.

◮ Cn ={

Xn(m, w)}

m,w

iid∼ Qn

X

2 Preliminary Step: maxPM ,S:|S|=µ

ICn(M ; Zn) ≤ max

m,S:|S|=µ

D(

P(Cn,S)Zµ|M=m

∣QµZ

)

3 Union Bound & Stronger SCL:

Ziv Goldfeld Ben Gurion University

Semantic Security vs. Active Adversaries 13

m = 1 m = 2 m = 2nR

. . .

w = 1

w = 2nR

......

...

...

n

P

(

{

maxPM ,S

ICn(M ; Zn) ≤ e−nγ1

}c)

≤P

(

maxm,S

D(

P(Cn,S)Zµ|M=m

∣QµZ

)

> e−nγ1

)

≤∑

m,S

P

(

D(

P(Cn,S)Zµ|M=m

∣QµZ

)

>e−nγ1

)

Taking R > αH(X) =⇒

Page 66: Semantic Security in the Presence of Active Adversariespeople.ece.cornell.edu/zivg/Talk_Feder.pdfPros: 1 Security versus computationally unlimited eavesdropper. 2 No shared key - Use

WTC II SS-Capacity - Achievability for U=X

1 Wiretap Code:

◮ W ∼ Unif[

1 : 2nR]

.

◮ Cn ={

Xn(m, w)}

m,w

iid∼ Qn

X

2 Preliminary Step: maxPM ,S:|S|=µ

ICn(M ; Zn) ≤ max

m,S:|S|=µ

D(

P(Cn,S)Zµ|M=m

∣QµZ

)

3 Union Bound & Stronger SCL:

Ziv Goldfeld Ben Gurion University

Semantic Security vs. Active Adversaries 13

m = 1 m = 2 m = 2nR

. . .

w = 1

w = 2nR

......

...

...

n

P

(

{

maxPM ,S

ICn(M ; Zn) ≤ e−nγ1

}c)

≤P

(

maxm,S

D(

P(Cn,S)Zµ|M=m

∣QµZ

)

> e−nγ1

)

≤∑

m,S

P

(

D(

P(Cn,S)Zµ|M=m

∣QµZ

)

>e−nγ1

)

≤ 2n2nRe−enγ2Taking R > αH(X) =⇒

Page 67: Semantic Security in the Presence of Active Adversariespeople.ece.cornell.edu/zivg/Talk_Feder.pdfPros: 1 Security versus computationally unlimited eavesdropper. 2 No shared key - Use

WTC II SS-Capacity - Achievability for U=X

1 Wiretap Code:

◮ W ∼ Unif[

1 : 2nR]

.

◮ Cn ={

Xn(m, w)}

m,w

iid∼ Qn

X

2 Preliminary Step: maxPM ,S:|S|=µ

ICn(M ; Zn) ≤ max

m,S:|S|=µ

D(

P(Cn,S)Zµ|M=m

∣QµZ

)

3 Union Bound & Stronger SCL:

Ziv Goldfeld Ben Gurion University

Semantic Security vs. Active Adversaries 13

m = 1 m = 2 m = 2nR

. . .

w = 1

w = 2nR

......

...

...

n

P

(

{

maxPM ,S

ICn(M ; Zn) ≤ e−nγ1

}c)

≤P

(

maxm,S

D(

P(Cn,S)Zµ|M=m

∣QµZ

)

> e−nγ1

)

≤∑

m,S

P

(

D(

P(Cn,S)Zµ|M=m

∣QµZ

)

>e−nγ1

)

≤ 2n2nRe−enγ2

−−−→n→∞

0Taking R > αH(X) =⇒

Page 68: Semantic Security in the Presence of Active Adversariespeople.ece.cornell.edu/zivg/Talk_Feder.pdfPros: 1 Security versus computationally unlimited eavesdropper. 2 No shared key - Use

WTC II SS-Capacity - Converse

SS-capacity WTC II ≤ Weak-secrecy-capacity WTC I

Ziv Goldfeld Ben Gurion University

Semantic Security vs. Active Adversaries 14

Page 69: Semantic Security in the Presence of Active Adversariespeople.ece.cornell.edu/zivg/Talk_Feder.pdfPros: 1 Security versus computationally unlimited eavesdropper. 2 No shared key - Use

WTC II SS-Capacity - Converse

SS-capacity WTC II ≤ Weak-secrecy-capacity WTC I

◮ WTC I with erasure DMC to Eve - Transition probability α.

Ziv Goldfeld Ben Gurion University

Semantic Security vs. Active Adversaries 14

Page 70: Semantic Security in the Presence of Active Adversariespeople.ece.cornell.edu/zivg/Talk_Feder.pdfPros: 1 Security versus computationally unlimited eavesdropper. 2 No shared key - Use

WTC II SS-Capacity - Converse

SS-capacity WTC II ≤ Weak-secrecy-capacity WTC I

◮ WTC I with erasure DMC to Eve - Transition probability α.

Difficulty: Eve might observe more Xi-s in WTC I than in WTC II.

Ziv Goldfeld Ben Gurion University

Semantic Security vs. Active Adversaries 14

Page 71: Semantic Security in the Presence of Active Adversariespeople.ece.cornell.edu/zivg/Talk_Feder.pdfPros: 1 Security versus computationally unlimited eavesdropper. 2 No shared key - Use

WTC II SS-Capacity - Converse

SS-capacity WTC II ≤ Weak-secrecy-capacity WTC I

◮ WTC I with erasure DMC to Eve - Transition probability α.

Difficulty: Eve might observe more Xi-s in WTC I than in WTC II.

Solution: Sanov’s theorem & Continuity of mutual information.

Ziv Goldfeld Ben Gurion University

Semantic Security vs. Active Adversaries 14

Page 72: Semantic Security in the Presence of Active Adversariespeople.ece.cornell.edu/zivg/Talk_Feder.pdfPros: 1 Security versus computationally unlimited eavesdropper. 2 No shared key - Use

Summary

Semantic Security: [Bellare-Tessaro-Vardy 2012]

Ziv Goldfeld Ben Gurion University

Semantic Security vs. Active Adversaries 15

Page 73: Semantic Security in the Presence of Active Adversariespeople.ece.cornell.edu/zivg/Talk_Feder.pdfPros: 1 Security versus computationally unlimited eavesdropper. 2 No shared key - Use

Summary

Semantic Security: [Bellare-Tessaro-Vardy 2012]

◮ Gold standard in cryptography - relevant for applications.

Ziv Goldfeld Ben Gurion University

Semantic Security vs. Active Adversaries 15

Page 74: Semantic Security in the Presence of Active Adversariespeople.ece.cornell.edu/zivg/Talk_Feder.pdfPros: 1 Security versus computationally unlimited eavesdropper. 2 No shared key - Use

Summary

Semantic Security: [Bellare-Tessaro-Vardy 2012]

◮ Gold standard in cryptography - relevant for applications.

◮ Equivalent to vanishing inf. leakage for all PM .

Ziv Goldfeld Ben Gurion University

Semantic Security vs. Active Adversaries 15

Page 75: Semantic Security in the Presence of Active Adversariespeople.ece.cornell.edu/zivg/Talk_Feder.pdfPros: 1 Security versus computationally unlimited eavesdropper. 2 No shared key - Use

Summary

Semantic Security: [Bellare-Tessaro-Vardy 2012]

◮ Gold standard in cryptography - relevant for applications.

◮ Equivalent to vanishing inf. leakage for all PM .

Stronger Soft-Covering Lemma:

Ziv Goldfeld Ben Gurion University

Semantic Security vs. Active Adversaries 15

Page 76: Semantic Security in the Presence of Active Adversariespeople.ece.cornell.edu/zivg/Talk_Feder.pdfPros: 1 Security versus computationally unlimited eavesdropper. 2 No shared key - Use

Summary

Semantic Security: [Bellare-Tessaro-Vardy 2012]

◮ Gold standard in cryptography - relevant for applications.

◮ Equivalent to vanishing inf. leakage for all PM .

Stronger Soft-Covering Lemma:

◮ Double-exponential decay of prob. of soft-covering not happening.

Ziv Goldfeld Ben Gurion University

Semantic Security vs. Active Adversaries 15

Page 77: Semantic Security in the Presence of Active Adversariespeople.ece.cornell.edu/zivg/Talk_Feder.pdfPros: 1 Security versus computationally unlimited eavesdropper. 2 No shared key - Use

Summary

Semantic Security: [Bellare-Tessaro-Vardy 2012]

◮ Gold standard in cryptography - relevant for applications.

◮ Equivalent to vanishing inf. leakage for all PM .

Stronger Soft-Covering Lemma:

◮ Double-exponential decay of prob. of soft-covering not happening.

◮ Satisfy exponentially many soft-covering constraints.

Ziv Goldfeld Ben Gurion University

Semantic Security vs. Active Adversaries 15

Page 78: Semantic Security in the Presence of Active Adversariespeople.ece.cornell.edu/zivg/Talk_Feder.pdfPros: 1 Security versus computationally unlimited eavesdropper. 2 No shared key - Use

Summary

Semantic Security: [Bellare-Tessaro-Vardy 2012]

◮ Gold standard in cryptography - relevant for applications.

◮ Equivalent to vanishing inf. leakage for all PM .

Stronger Soft-Covering Lemma:

◮ Double-exponential decay of prob. of soft-covering not happening.

◮ Satisfy exponentially many soft-covering constraints.

Wiretap Channel II: Noisy Main Channel

Ziv Goldfeld Ben Gurion University

Semantic Security vs. Active Adversaries 15

Page 79: Semantic Security in the Presence of Active Adversariespeople.ece.cornell.edu/zivg/Talk_Feder.pdfPros: 1 Security versus computationally unlimited eavesdropper. 2 No shared key - Use

Summary

Semantic Security: [Bellare-Tessaro-Vardy 2012]

◮ Gold standard in cryptography - relevant for applications.

◮ Equivalent to vanishing inf. leakage for all PM .

Stronger Soft-Covering Lemma:

◮ Double-exponential decay of prob. of soft-covering not happening.

◮ Satisfy exponentially many soft-covering constraints.

Wiretap Channel II: Noisy Main Channel

◮ Derivation of SS-capacity & Equality to weak-secrecy-capacity.

Ziv Goldfeld Ben Gurion University

Semantic Security vs. Active Adversaries 15

Page 80: Semantic Security in the Presence of Active Adversariespeople.ece.cornell.edu/zivg/Talk_Feder.pdfPros: 1 Security versus computationally unlimited eavesdropper. 2 No shared key - Use

Summary

Semantic Security: [Bellare-Tessaro-Vardy 2012]

◮ Gold standard in cryptography - relevant for applications.

◮ Equivalent to vanishing inf. leakage for all PM .

Stronger Soft-Covering Lemma:

◮ Double-exponential decay of prob. of soft-covering not happening.

◮ Satisfy exponentially many soft-covering constraints.

Wiretap Channel II: Noisy Main Channel

◮ Derivation of SS-capacity & Equality to weak-secrecy-capacity.

◮ Classic erasure wiretap codes achieve SS-capacity.

Ziv Goldfeld Ben Gurion University

Semantic Security vs. Active Adversaries 15

Page 81: Semantic Security in the Presence of Active Adversariespeople.ece.cornell.edu/zivg/Talk_Feder.pdfPros: 1 Security versus computationally unlimited eavesdropper. 2 No shared key - Use

Summary

Semantic Security: [Bellare-Tessaro-Vardy 2012]

◮ Gold standard in cryptography - relevant for applications.

◮ Equivalent to vanishing inf. leakage for all PM .

Stronger Soft-Covering Lemma:

◮ Double-exponential decay of prob. of soft-covering not happening.

◮ Satisfy exponentially many soft-covering constraints.

Wiretap Channel II: Noisy Main Channel

◮ Derivation of SS-capacity & Equality to weak-secrecy-capacity.

◮ Classic erasure wiretap codes achieve SS-capacity.

Thank You!

Ziv Goldfeld Ben Gurion University

Semantic Security vs. Active Adversaries 15