Bit Security Estimation Using Various Information-Theoretic Measures

被引:0
|
作者
Lee, Dong-Hoon [1 ]
Kim, Young-Sik [2 ]
No, Jong-Seon [1 ]
机构
[1] Seoul Natl Univ, Dept ECE, Seoul 08826, South Korea
[2] Chosun Univ, Dept EE, Gwangju 61452, South Korea
关键词
Cryptography; Probability distribution; Games; Random variables; Particle measurements; Atmospheric measurements; Volume measurement; Bit security; Hellinger distance; information-theoretic measures; Kullback-Leibler divergence; lambda-efficient measure; max-log distance; relative error; Renyi divergence; security reduction; statistical distance;
D O I
10.1109/ACCESS.2021.3119707
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose various quantitative information-theoretic bit security reduction measures that correlate the statistical difference between two probability distributions with the security level gap for two cryptographic schemes. We derive tighter relations between information-theoretic measures for quantifying the precision and guarantee the security level of the cryptographic scheme implemented over a precision-restricted environment. Further, the generalized versions of previous security reductions are devised by relaxing the constraints on the upper bounds of the information-theoretic measures. This makes it possible to estimate bit security more reliable and improves the security level. We also estimate the effects on the security level when the kappa-bit secure original scheme is implemented on a p-bit precision system. In previous studies, pwas fixed as kappa/2 however, the proposed schemes are generalized such that the security level kappa and precision pcan vary independently. This results in a significant difference. Moreover, previous results cannot provide the exact lower bound of the security level for p not equal kappa/2. However, the proposed results can provide the exact lower bound of the estimation value of the security level as long as the precision psatisfies certain conditions. We provide diverse types of security reduction formulas for the six types of information-theoretic measures. The proposed schemes can provide information-theoretic guidelines regarding the difference between the security levels of two identical cryptographic schemes when extracting randomness from two different probability distributions. In particular, the proposed schemes can be used to quantitatively estimate the effect of the statistical difference between the ideal and real distributions on the security level.
引用
收藏
页码:140103 / 140115
页数:13
相关论文
共 50 条
  • [21] INFORMATION-THEORETIC DISTORTION MEASURES FOR SPEECH RECOGNITION
    LEE, YT
    IEEE TRANSACTIONS ON SIGNAL PROCESSING, 1991, 39 (02) : 330 - 335
  • [22] Multimodal information-theoretic measures for autonomous exploration
    Rao, Dushyant
    Bender, Asher
    Williams, Stefan B.
    Pizarro, Oscar
    2016 IEEE INTERNATIONAL CONFERENCE ON ROBOTICS AND AUTOMATION (ICRA), 2016, : 4230 - 4237
  • [23] On Measures of Information Theoretic Security
    Liu, Shuiyin
    Hong, Yi
    Viterbo, Emanuele
    2014 IEEE INFORMATION THEORY WORKSHOP (ITW), 2014, : 309 - 310
  • [24] Information-theoretic measures for objective evaluation of classifications
    Hu, B.-G. (hubg@nlpr.ia.ac.cn), 2012, Science Press (38):
  • [25] On the Robustness of Information-Theoretic Privacy Measures and Mechanisms
    Diaz, Mario
    Wang, Hao
    Calmon, Flavio P.
    Sankar, Lalitha
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2020, 66 (04) : 1949 - 1978
  • [26] INFORMATION-THEORETIC MEASURES AND ANALYSIS OF SOCIAL STRUCTURES
    HORAN, PM
    SOCIOLOGICAL METHODS & RESEARCH, 1975, 3 (03) : 321 - 340
  • [27] Mosaics of combinatorial designs for information-theoretic security
    Wiese, Moritz
    Boche, Holger
    DESIGNS CODES AND CRYPTOGRAPHY, 2022, 90 (03) : 593 - 632
  • [28] Generalized Information-Theoretic Measures for Feature Selection
    Sluga, Davor
    Lotric, Uros
    ADAPTIVE AND NATURAL COMPUTING ALGORITHMS, ICANNGA 2013, 2013, 7824 : 189 - 197
  • [29] Mosaics of combinatorial designs for information-theoretic security
    Moritz Wiese
    Holger Boche
    Designs, Codes and Cryptography, 2022, 90 : 593 - 632
  • [30] Information-theoretic security without an honest majority
    Broadbent, Anne
    Tapp, Alain
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2007, 2007, 4833 : 410 - 426