000141319 001__ 141319
000141319 005__ 20190812205338.0
000141319 037__ $$aCONF
000141319 245__ $$aInvertible Extractors and Wiretap Protocols
000141319 269__ $$a2009
000141319 260__ $$c2009
000141319 336__ $$aConference Papers
000141319 520__ $$aA wiretap protocol is a pair of randomized encoding and decoding functions such that knowledge of a bounded fraction of the encoding of a message reveals essentially no information about the message, while knowledge of the entire encoding reveals the message using the decoder. In this paper we study the notion of efficiently invertible extractors and show that a wiretap protocol can be constructed from such an extractor. We will then construct invertible extractors for symbol-fixing, affine, and general sources and apply them to create wiretap protocols with asymptotically optimal trade-offs between their rate (ratio of the length of the message versus its encoding) and resilience (ratio of the observed positions of the encoding and the length of the encoding). We will then apply our results to create wiretap protocols for challenging communication problems, such as active intruders who change portions of the encoding, network coding, and intruders observing arbitrary boolean functions of the encoding.
000141319 6531_ $$aalgoweb_cryptography
000141319 6531_ $$aalgoweb_tcs
000141319 700__ $$aCheraghchi, Mahdi
000141319 700__ $$aDidier, Feredric
000141319 700__ $$0241952$$g156849$$aShokrollahi, Amin
000141319 7112_ $$d2009$$aIEEE International Symposium on Information Theory (ISIT)
000141319 773__ $$tProceedings of the IEEE International Symposium on Information Theory (ISIT)$$q1934--1938
000141319 8564_ $$zn/a$$yn/a$$uhttps://infoscience.epfl.ch/record/141319/files/ISIT09camera.pdf$$s176086
000141319 909C0 $$xU10735$$pALGO$$0252198
000141319 909CO $$ooai:infoscience.tind.io:141319$$qGLOBAL_SET$$pconf$$pIC
000141319 917Z8 $$x276415
000141319 917Z8 $$x156849
000141319 937__ $$aALGO-CONF-2009-003
000141319 973__ $$rREVIEWED$$sPUBLISHED$$aEPFL
000141319 980__ $$aCONF