Bit Security Estimation Using Various Information-Theoretic Measures

被引:0
|
作者
Lee, Dong-Hoon [1 ]
Kim, Young-Sik [2 ]
No, Jong-Seon [1 ]
机构
[1] Seoul Natl Univ, Dept ECE, Seoul 08826, South Korea
[2] Chosun Univ, Dept EE, Gwangju 61452, South Korea
关键词
Cryptography; Probability distribution; Games; Random variables; Particle measurements; Atmospheric measurements; Volume measurement; Bit security; Hellinger distance; information-theoretic measures; Kullback-Leibler divergence; lambda-efficient measure; max-log distance; relative error; Renyi divergence; security reduction; statistical distance;
D O I
10.1109/ACCESS.2021.3119707
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose various quantitative information-theoretic bit security reduction measures that correlate the statistical difference between two probability distributions with the security level gap for two cryptographic schemes. We derive tighter relations between information-theoretic measures for quantifying the precision and guarantee the security level of the cryptographic scheme implemented over a precision-restricted environment. Further, the generalized versions of previous security reductions are devised by relaxing the constraints on the upper bounds of the information-theoretic measures. This makes it possible to estimate bit security more reliable and improves the security level. We also estimate the effects on the security level when the kappa-bit secure original scheme is implemented on a p-bit precision system. In previous studies, pwas fixed as kappa/2 however, the proposed schemes are generalized such that the security level kappa and precision pcan vary independently. This results in a significant difference. Moreover, previous results cannot provide the exact lower bound of the security level for p not equal kappa/2. However, the proposed results can provide the exact lower bound of the estimation value of the security level as long as the precision psatisfies certain conditions. We provide diverse types of security reduction formulas for the six types of information-theoretic measures. The proposed schemes can provide information-theoretic guidelines regarding the difference between the security levels of two identical cryptographic schemes when extracting randomness from two different probability distributions. In particular, the proposed schemes can be used to quantitatively estimate the effect of the statistical difference between the ideal and real distributions on the security level.
引用
收藏
页码:140103 / 140115
页数:13
相关论文
共 50 条
  • [31] Information-Theoretic Measures for Meta-learning
    Segrera, Saddys
    Pinho, Joel
    Moreno, Maria N.
    HYBRID ARTIFICIAL INTELLIGENCE SYSTEMS, 2008, 5271 : 458 - 465
  • [32] Information-Theoretic Security in Stochastic Control Systems
    Venkitasubramaniam, Parv
    Yao, Jiyun
    Pradhan, Parth
    PROCEEDINGS OF THE IEEE, 2015, 103 (10) : 1914 - 1931
  • [33] Optimizing the bit aspect ratio of a recording system using an information-theoretic criterion
    Yang, SH
    Kavcic, A
    Ryan, W
    IEEE TRANSACTIONS ON MAGNETICS, 2003, 39 (05) : 2228 - 2230
  • [34] Analysis of defect tolerance in molecular electronics using information-theoretic measures
    Dai, Jianwei
    Wang, Lei
    Jain, Faquir
    2007 IEEE INTERNATIONAL SYMPOSIUM ON NANOSCALE ARCHITECTURE, 2007, : 21 - 26
  • [35] An information-theoretic approach to traffic matrix estimation
    Zhang, Y
    Roughan, M
    Lund, C
    Donoho, D
    ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2003, 33 (04) : 301 - 312
  • [36] Information-theoretic approaches to privacy in estimation and control
    Nekouei, Ehsan
    Tanaka, Takashi
    Skoglund, Mikael
    Johansson, Karl H.
    ANNUAL REVIEWS IN CONTROL, 2019, 47 : 412 - 422
  • [37] An Information-Theoretic Perspective on the Quantum Bit Commitment Impossibility Theorem
    Nagy, Marius
    Nagy, Naya
    ENTROPY, 2018, 20 (03)
  • [38] An information-theoretic security analysis of quantum string sealing
    Nakanishi, Masaki
    Tani, Sechiro
    Yamashita, Shigeru
    PROCEEDINGS OF THE 6TH WSEAS INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND PRIVACY (ISP '07): ADVANCED TOPICS IN INFORMATION SECURITY AND PRIVACY, 2007, : 30 - +
  • [39] Signal detection and estimation using atomic decomposition and information-theoretic criteria
    López-Risueño, G
    Grajal, J
    Yeste-Ojeda, OA
    2004 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOL II, PROCEEDINGS: SENSOR ARRAY AND MULTICHANNEL SIGNAL PROCESSING SIGNAL PROCESSING THEORY AND METHODS, 2004, : 1097 - 1100
  • [40] An information-theoretic perspective of tf-idf measures
    Aizawa, A
    INFORMATION PROCESSING & MANAGEMENT, 2003, 39 (01) : 45 - 65