Proceedings of CRYPTO 84 on Advances in cryptology
Privacy amplification by public discussion
SIAM Journal on Computing - Special issue on cryptography
Extractors and pseudorandom generators
Journal of the ACM (JACM)
Introduction to Coding Theory
Extracting all the randomness and reducing the error in Trevisan's extractors
Journal of Computer and System Sciences - STOC 1999
Exposure-resilient cryptography
Exposure-resilient cryptography
Network coding theory: single sources
Communications and Information Theory
Deterministic Extractors for Bit-Fixing Sources and Exposure-Resilient Cryptography
SIAM Journal on Computing
Exposure-resilient functions and all-or-nothing transforms
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
Generalized strong extractors and deterministic privacy amplification
IMA'05 Proceedings of the 10th international conference on Cryptography and Coding
Generalized privacy amplification
IEEE Transactions on Information Theory - Part 2
Applications of LDPC Codes to the Wiretap Channel
IEEE Transactions on Information Theory
Hi-index | 0.00 |
A wiretap protocol is a pair of randomized encoding and decoding functions such that knowledge of a bounded fraction of the encoding of a message reveals essentially no information about the message, while knowledge of the entire encoding reveals the message using the decoder. In this paper we study the notion of efficiently invertible extractors and show that a wiretap protocol can be constructed from such an extractor. We will then construct invertible extractors for symbol-fixing, affine, and general sources and apply them to create wiretap protocols with asymptotically optimal trade-offs between their rate (ratio of the length of the message versus its encoding) and resilience (ratio of the observed positions of the encoding) and the length of the encoding). We will then apply our results to create wiretap protocols for challenging communication problems, such as active intruders who change portions of the encoding, network coding, and intruders observing arbitrary boolean functions of the encoding.