Semantic Security via Seeded Modular Coding Schemes and Ramanujan Graphs

A novel type of functions called biregular irreducible functions is introduced and applied as security components (instead of, e.g., universal hash functions) in seeded modular wiretap coding schemes, whose second component is an error-correcting code. These schemes are called modular BRI schemes. An upper bound on the semantic security information leakage of modular BRI schemes in a one-shot setting is derived which separates the effects of the biregular irreducible function on the one hand and the error-correcting code plus the channel on the other hand. The effect of the biregular irreducible function is described by the second-largest eigenvalue of an associated stochastic matrix. A characterization of biregular irreducible functions is given in terms of connected edge-disjoint biregular graphs. It allows for the construction of new biregular irreducible functions from families of edge-disjoint Ramanujan graphs, which are shown to exist. A concrete and frequently used arithmetic universal hash function can be converted into a biregular irreducible function for certain parameters. Sequences of Ramanujan biregular irreducible functions are constructed which exhibit an optimal trade-off between the size of the regularity set and the rate of decrease of the associated second-largest eigenvalue. Together with the one-shot bound on the information leakage, the existence of these sequences implies an asymptotic coding result for modular BRI schemes applied to discrete and Gaussian wiretap channels. It shows that the separation of error correction and security as done in a modular BRI scheme is secrecy capacity-achieving for every discrete and Gaussian wiretap channel. The same holds for a derived construction where the seed is generated locally by the sender and reused several times. It is shown that the optimal sequences of biregular irreducible functions used in the above constructions must be nearly Ramanujan.

[1]  Haim H. Permuter,et al.  Semantic-security capacity for wiretap channels of type II , 2015, 2016 IEEE International Symposium on Information Theory (ISIT).

[2]  Joseph M. Renes,et al.  Noisy Channel Coding via Privacy Amplification and Information Reconciliation , 2010, IEEE Transactions on Information Theory.

[3]  Mihir Bellare,et al.  Polynomial-Time, Semantically-Secure Encryption Achieving the Secrecy Capacity , 2012, IACR Cryptol. ePrint Arch..

[4]  Alexander Vardy,et al.  Semantic Security for the Wiretap Channel , 2012, CRYPTO.

[5]  N. Katz An estimate for character sums , 1989 .

[6]  Haim H. Permuter,et al.  Key and Message Semantic-Security Over State-Dependent Channels , 2020, IEEE Transactions on Information Forensics and Security.

[7]  Cong Ling,et al.  Semantically Secure Lattice Codes for the Gaussian Wiretap Channel , 2012, IEEE Transactions on Information Theory.

[8]  Masahito Hayashi,et al.  General nonasymptotic and asymptotic formulas in channel resolvability and identification capacity and their application to the wiretap channel , 2006, IEEE Transactions on Information Theory.

[9]  Igor Devetak The private classical capacity and quantum capacity of a quantum channel , 2005, IEEE Transactions on Information Theory.

[10]  Masahito Hayashi,et al.  Exponential Decreasing Rate of Leaked Information in Universal Random Privacy Amplification , 2009, IEEE Transactions on Information Theory.

[11]  Peter Harremoës,et al.  Rényi Divergence and Kullback-Leibler Divergence , 2012, IEEE Transactions on Information Theory.

[12]  Haim H. Permuter,et al.  Arbitrarily Varying Wiretap Channels with Type Constrained States , 2016, 2016 IEEE Globecom Workshops (GC Wkshps).

[13]  F. Chung Diameters and eigenvalues , 1989 .

[14]  Alexander Vardy,et al.  Channel upgrading for semantically-secure encryption on wiretap channels , 2013, 2013 IEEE International Symposium on Information Theory.

[15]  Himanshu Tyagi,et al.  Universal Hashing for Information-Theoretic Security , 2014, Proceedings of the IEEE.

[16]  M. Murty Ramanujan Graphs , 1965 .

[17]  Renato Renner,et al.  Smooth Renyi entropy and applications , 2004, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..

[18]  Ueli Maurer,et al.  Generalized privacy amplification , 1994, Proceedings of 1994 IEEE International Symposium on Information Theory.

[19]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[20]  Ling Liu,et al.  Achieving Secrecy Capacity of the Gaussian Wiretap Channel With Polar Lattices , 2015, IEEE Transactions on Information Theory.

[21]  Renato Renner,et al.  Simple and Tight Bounds for Information Reconciliation and Privacy Amplification , 2005, ASIACRYPT.

[22]  Larry Carter,et al.  Universal Classes of Hash Functions , 1979, J. Comput. Syst. Sci..

[23]  Noga Alon,et al.  On the second eigenvalue of a graph , 1991, Discret. Math..

[24]  J. Massey,et al.  Communications and Cryptography: Two Sides of One Tapestry , 1994 .

[25]  Holger Boche,et al.  Semantic Security for Quantum Wiretap Channels , 2020, 2020 IEEE International Symposium on Information Theory (ISIT).

[26]  Slawomir Stanczak,et al.  The MAC Resolvability Region, Semantic Security and Its Operational Implications , 2017, ArXiv.

[27]  Rudolf Ahlswede,et al.  Common randomness in information theory and cryptography - I: Secret sharing , 1993, IEEE Trans. Inf. Theory.

[28]  Gilles Brassard,et al.  Privacy Amplification by Public Discussion , 1988, SIAM J. Comput..

[29]  Riccardo Pucella Review of Foundations of Cryptography II : Basic Applications ∗ , 2005 .

[30]  Masahito Hayashi,et al.  Security analysis of ε-almost dual universal 2 hash functions , 2014 .

[31]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[32]  Matthieu R. Bloch,et al.  Strong Secrecy From Channel Resolvability , 2011, IEEE Transactions on Information Theory.

[33]  U. Maurer The Strong Secret Key Rate of Discrete Random Triples , 1994 .

[34]  Nathan Linial,et al.  Lifts, Discrepancy and Nearly Optimal Spectral Gap* , 2006, Comb..

[35]  N. Linial,et al.  Expander Graphs and their Applications , 2006 .

[36]  Michael B. Cohen,et al.  Ramanujan Graphs in Polynomial Time , 2016, 2016 IEEE 57th Annual Symposium on Foundations of Computer Science (FOCS).

[37]  Sergio Verdú,et al.  Approximation theory of output statistics , 1993, IEEE Trans. Inf. Theory.

[38]  Leonid A. Levin,et al.  Pseudo-random generation from one-way functions , 1989, STOC '89.

[39]  John Odentrantz,et al.  Markov Chains: Gibbs Fields, Monte Carlo Simulation, and Queues , 2000, Technometrics.

[40]  W. Li,et al.  Spectra of Hypergraphs and Applications , 1996 .

[41]  Masahito Hayashi,et al.  Secure multiplex coding with dependent and non-uniform multiple messages , 2012, 2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[42]  Andrew Thangaraj,et al.  Error-Control Coding for Physical-Layer Secrecy , 2015, Proceedings of the IEEE.

[43]  S. Rajsbaum Foundations of Cryptography , 2014 .

[44]  Silvio Micali,et al.  Probabilistic Encryption , 1984, J. Comput. Syst. Sci..

[45]  Moritz Wiese,et al.  A Channel Under Simultaneous Jamming and Eavesdropping Attack—Correlated Random Coding Capacities Under Strong Secrecy Criteria , 2014, IEEE Transactions on Information Theory.

[46]  Nikhil Srivastava,et al.  Interlacing Families I: Bipartite Ramanujan Graphs of All Degrees , 2013, 2013 IEEE 54th Annual Symposium on Foundations of Computer Science.

[47]  Alexander Vardy,et al.  A Cryptographic Treatment of the Wiretap Channel , 2012, IACR Cryptol. ePrint Arch..