Information Theoretic Security and Privacy of Information Systems

Information Theoretic Security and Privacy of Information Systems PDF

Author: Rafael F. Schaefer

Publisher: Cambridge University Press

Published: 2017-06-16

Total Pages: 581

ISBN-13: 1107132266

DOWNLOAD EBOOK →

Learn how information theoretic approaches can inform the design of more secure information systems and networks with this expert guide. Covering theoretical models, analytical results, and the state of the art in research, it will be of interest to researchers, graduate students, and practitioners working in communications engineering.

Information Theoretic Security

Information Theoretic Security PDF

Author: Yingbin Liang

Publisher: Now Publishers Inc

Published: 2009

Total Pages: 246

ISBN-13: 1601982402

DOWNLOAD EBOOK →

Surveys the research dating back to the 1970s which forms the basis of applying this technique in modern communication systems. It provides an overview of how information theoretic approaches are developed to achieve secrecy for a basic wire-tap channel model and for its extensions to multiuser networks.

Information Theoretic Approaches for Security and Privacy

Information Theoretic Approaches for Security and Privacy PDF

Author: Wenwen Tu

Publisher:

Published: 2018

Total Pages:

ISBN-13: 9780438628786

DOWNLOAD EBOOK →

Information theoretic security and privacy is an emerging field in information theory that aims to secure future generations of communication systems by exploiting physical layer properties of communication channels or sources. The notion "information theoretic" means that the security and privacy of the system does not depend on the computational power of the adversary, i.e., it cannot be compromised even when the adversary has an unlimited computational power. In this dissertation, we examine several information theoretic security and privacy issues, including Simulatability condition, Secret key sharing, Message authentication and Function computation. Utilizing a common secret key for communication is a basic approach to protect secrecy and privacy. In the first part of this dissertation, we investigate the problem of checking simulatability condition, a fundamental concept in studying key generation in the presence of an active adversary. This condition determines whether there exist communication protocols so that the legitimate parties are able to share secret keys in certain important scenarios. In this problem, we provide an efficient algorithm to check whether the simulatability condition holds or not. Furthermore, we provide an efficient algorithm for finding the attack strategy that the adversary can use to attack the key generation process. We also show that simulatability condition is not sensitive on the knowledge about the adversary's observations. We then investigate the problem of simultaneously generating multiple keys in a joint source-channel model in Chapter 3. In this problem, we first study a special case where Eve has no side information and provide a full characterization on the secret-key capacity region. The obtained result shows that there exists a trade-off between individual secret-key rates. Then we generalize the result into the general case where Eve has side information, and fully characterize the corresponding secret-key capacity region as well. In Chapter 4, we consider the problem of keyless message authentication over noisy channels. We study how to exploit the channel properties to guarantee that the receiver is able to determine the authenticity of received messages. We characterize both the authentication exponent (the speed at which the optimal successful attack probability can be driven to zero) and the authenticated capacity (the largest message rate at which the optimal successful attack probability can be made arbitrarily small). The goal of secure function computation is to design methods for communication parties to compute a function over their inputs while keeping those inputs private. We investigate both secrecy and privacy issues in the problem of function computation. We allow distortion in the computed function and study the relationship of the message rates, the rate distortion, the private information leakage of the transmitters' sources to the receiver, and the secrecy of those sources at the eavesdropper. We fully characterize the achievable region of these parameters in a special case. We further provide both inner and outer bounds for the general case. These inner and outer bounds are tight for certain scenarios.

Information-theoretic Metrics for Security and Privacy

Information-theoretic Metrics for Security and Privacy PDF

Author: Flavio du Pin Calmon

Publisher:

Published: 2015

Total Pages: 150

ISBN-13:

DOWNLOAD EBOOK →

In this thesis, we study problems in cryptography, privacy and estimation through the information-theoretic lens. We introduce information-theoretic metrics and associated results that shed light on the fundamental limits of what can be learned from noisy data. These metrics and results, in turn, are used to evaluate and design both symmetric-key encryption schemes and privacy-assuring mappings with provable information-theoretic security guarantees. We start by studying information-theoretic properties of symmetric-key encryption in the "small key" regime (i.e. when the key rate is smaller than the entropy rate of the message source). It is well known that security against computationally unbounded adversaries in such settings can only be achieved when the communicating parties share a key that is at least as long as the secret message (i.e. plaintext) being communicated, which is infeasible in practice. Nevertheless, even with short keys, we show that a certain level of security can be guaranteed, albeit not perfect secrecy. In order to quantify exactly how much security can be provided with short keys, we propose a new security metric, called symbol secrecy, that measures how much an adversary that observes only the encrypted message learns about individual symbols of the plaintext. Unlike most traditional rate-based information-theoretic metrics for security, symbol secrecy is non-asymptotic. Furthermore, we demonstrate how fundamental symbol secrecy performance bounds can be achieved through standard code constructions (e.g. Reed-Solomon codes). While much of information-theoretic security has considered the hiding of the plaintext, cryptographic metrics of security seek to hide functions thereof. Consequently, we extend the definition of symbol secrecy to quantify the information leaked about certain classes of functions of the plaintext. This analysis leads to a more general question: can security claims based on information metrics be translated into guarantees on what an adversary can reliably infer from the output of a security system? On the one hand, information metrics usually quantify how far the probability distribution between the secret and the disclosed information is from the ideal case where independence is achieved. On the other hand, estimation guarantees seek to assure that an adversary cannot significantly improve his estimate of the secret given the information disclosed by the system. We answer this question in the positive, and present formulations based on rate-distortion theory that allow security bounds given in terms of information metrics to be transformed into bounds on how well an adversary can estimate functions of secret variable. We do this by solving a convex program that minimizes the average estimation error over all possible distributions that satisfy the bound on the information metric. Using this approach, we are able to derive a set of general sharp bounds on how well certain classes of functions of a hidden variable can(not) be estimated from a noisy observation in terms of different information metrics. These bounds provide converse (negative) results: If an information metric is small, then any non-trivial function of the hidden variable cannot be estimated with probability of error or mean-squared error smaller than a certain threshold. The main tool used to derive the converse bounds is a set of statistics known as the Principal Inertia Components (PICs). The PICs provide a fine-grained decomposition of the dependence between two random variables. Since there are well-studied statistical methods for estimating the PICs, we can then determine the (im)possibility of estimating large classes of functions by using the bounds derived in this thesis and standard statistical tests. The PICs are of independent interest, and are applicable to problems in information theory, statistics, learning theory, and beyond. In the security and privacy setting, the PICs fulfill the dual goal of providing (i) a measure of (in)dependence between the secret and disclosed information of a security system, and (ii) a complete characterization of the functions of the secret information that can or cannot be reliably inferred given the disclosed information. We study the information-theoretic properties of the PICs, and show how they characterize the fundamental limits of perfect privacy. The results presented in this thesis are applicable to estimation, security and privacy. For estimation and statistical learning theory, they shed light on the fundamental limits of learning from noisy data, and can help guide the design of practical learning algorithms. Furthermore, as illustrated in this thesis, the proposed converse bounds are particularly useful for creating security and privacy metrics, and characterize the inherent trade-off between privacy and utility in statistical data disclosure problems. The study of security systems through the information-theoretic lens adds a new dimension for understanding and quantifying security against very powerful adversaries. Furthermore, the framework and metrics discussed here provide practical insight on how to design and improve security systems using well-known coding and optimization techniques. We conclude the thesis by presenting several promising future research directions.

Information Theory, Mathematical Optimization, and Their Crossroads in 6G System Design

Information Theory, Mathematical Optimization, and Their Crossroads in 6G System Design PDF

Author: Shih-Chun Lin

Publisher: Springer Nature

Published: 2022-09-18

Total Pages: 403

ISBN-13: 9811920168

DOWNLOAD EBOOK →

This book provides a broad understanding of the fundamental tools and methods from information theory and mathematical programming, as well as specific applications in 6G and beyond system designs. The contents focus on not only both theories but also their intersection in 6G. Motivations are from the multitude of new developments which will arise once 6G systems integrate new communication networks with AIoT (Artificial Intelligence plus Internet of Things). Design issues such as the intermittent connectivity, low latency, federated learning, IoT security, etc., are covered. This monograph provides a thorough picture of new results from information and optimization theories, as well as how their dialogues work to solve aforementioned 6G design issues.

Information Theoretic Perspectives on 5G Systems and Beyond

Information Theoretic Perspectives on 5G Systems and Beyond PDF

Author: Ivana Marić

Publisher:

Published: 2022-06-15

Total Pages: 768

ISBN-13: 1108271367

DOWNLOAD EBOOK →

Understand key information-theoretic principles that underpin the design of next-generation cellular systems with this invaluable resource. This book is the perfect tool for researchers and graduate students in the field of information theory and wireless communications, as well as for practitioners in the telecommunications industry.

Information Theoretic Security

Information Theoretic Security PDF

Author: Adam Smith

Publisher: Springer

Published: 2012-08-04

Total Pages: 222

ISBN-13: 3642322840

DOWNLOAD EBOOK →

This book constitutes the proceedings of the 6th International Conference on Information Theoretic Security, ICITS 2012, held in Montreal, Canada, in August 2012. The 11 full papers presented in this volume were carefully reviewed and selected from 46 submissions. In addition 11 papers were selected for the workshop track, abstracts of 7 of these contributions are also included in this book. Topics of interest are: physical layer security; multiparty computations; codes, lattices and cryptography; authentication codes; randomness extraction; cryptography from noisy channels; wiretap channels; bounded-storage models; information-theoretic reductions; quantum cryptography; quantum information theory; nonlocality and nonsignaling; key and message rates; secret sharing; physical models and assumptions; network coding security; adversarial channel models; information-theoretic tools in computational settings; implementation challenges; and biometric security.

Information Theoretic Security

Information Theoretic Security PDF

Author: Anderson C.A. Nascimento

Publisher: Springer

Published: 2016-11-09

Total Pages: 300

ISBN-13: 331949175X

DOWNLOAD EBOOK →

This book constitutes the thoroughly refereed proceedings fo the 9th International Conference on Information Theoretic Security, ICITS 2016, held in Tacoma, WA, USA, in August 2016. The 14 full papers presented in this volume were carefully reviewed and selected from 40 submissions. They are organized around the following topics: secret sharing; quantum cryptography; visual cryptography; cryptographic protocols; entropy, extractors and privacy.

Physical-Layer Security

Physical-Layer Security PDF

Author: Matthieu Bloch

Publisher: Cambridge University Press

Published: 2011-09-22

Total Pages: 347

ISBN-13: 1139496298

DOWNLOAD EBOOK →

This complete guide to physical-layer security presents the theoretical foundations, practical implementation, challenges and benefits of a groundbreaking new model for secure communication. Using a bottom-up approach from the link level all the way to end-to-end architectures, it provides essential practical tools that enable graduate students, industry professionals and researchers to build more secure systems by exploiting the noise inherent to communications channels. The book begins with a self-contained explanation of the information-theoretic limits of secure communications at the physical layer. It then goes on to develop practical coding schemes, building on the theoretical insights and enabling readers to understand the challenges and opportunities related to the design of physical layer security schemes. Finally, applications to multi-user communications and network coding are also included.