Skip to main content

Showing 1–7 of 7 results for author: Christiansen, M M

Searching in archive cs. Search in all archives.
.
  1. arXiv:1503.08513  [pdf, ps, other

    cs.IT

    Hiding Symbols and Functions: New Metrics and Constructions for Information-Theoretic Security

    Authors: Flavio du Pin Calmon, Muriel Médard, Mayank Varia, Ken R. Duffy, Mark M. Christiansen, Linda M. Zeger

    Abstract: We present information-theoretic definitions and results for analyzing symmetric-key encryption schemes beyond the perfect secrecy regime, i.e. when perfect secrecy is not attained. We adopt two lines of analysis, one based on lossless source coding, and another akin to rate-distortion theory. We start by presenting a new information-theoretic metric for security, called symbol secrecy, and derive… ▽ More

    Submitted 29 March, 2015; originally announced March 2015.

    Comments: Submitted to IEEE Transactions on Information Theory

  2. Multi-user guesswork and brute force security

    Authors: Mark M. Christiansen, Ken R. Duffy, Flavio du Pin Calmon, Muriel Medard

    Abstract: The Guesswork problem was originally motivated by a desire to quantify computational security for single user systems. Leveraging recent results from its analysis, we extend the remit and utility of the framework to the quantification of the computational security for multi-user systems. In particular, assume that $V$ users independently select strings stochastically from a finite, but potentially… ▽ More

    Submitted 3 August, 2017; v1 submitted 20 May, 2014; originally announced May 2014.

    Journal ref: EEE Transactions on Information Theory, 61 (12), 6876-6886 (2015)

  3. arXiv:1311.1053  [pdf, other

    cs.IT

    Guessing a password over a wireless channel (on the effect of noise non-uniformity)

    Authors: Mark M. Christiansen, Ken R. Duffy, Flavio du Pin Calmon, Muriel Medard

    Abstract: A string is sent over a noisy channel that erases some of its characters. Knowing the statistical properties of the string's source and which characters were erased, a listener that is equipped with an ability to test the veracity of a string, one string at a time, wishes to fill in the missing pieces. Here we characterize the influence of the stochastic properties of both the string's source and… ▽ More

    Submitted 26 November, 2013; v1 submitted 5 November, 2013; originally announced November 2013.

    Comments: Asilomar Conference on Signals, Systems & Computers, 2013

  4. arXiv:1310.1512  [pdf, ps, other

    cs.IT

    Bounds on inference

    Authors: Flavio du Pin Calmon, Mayank Varia, Muriel Médard, Mark M. Christiansen, Ken R. Duffy, Stefano Tessaro

    Abstract: Lower bounds for the average probability of error of estimating a hidden variable X given an observation of a correlated random variable Y, and Fano's inequality in particular, play a central role in information theory. In this paper, we present a lower bound for the average estimation error based on the marginal distribution of X and the principal inertias of the joint distribution matrix of X an… ▽ More

    Submitted 5 October, 2013; originally announced October 2013.

    Comments: Allerton 2013 with extended proof, 10 pages

  5. arXiv:1301.6356  [pdf, other

    cs.IT cs.CR

    Brute force searching, the typical set and Guesswork

    Authors: Mark M. Christiansen, Ken R. Duffy, Flavio du Pin Calmon, Muriel Medard

    Abstract: Consider the situation where a word is chosen probabilistically from a finite list. If an attacker knows the list and can inquire about each word in turn, then selecting the word via the uniform distribution maximizes the attacker's difficulty, its Guesswork, in identifying the chosen word. It is tempting to use this property in cryptanalysis of computationally secure ciphers by assuming coded wor… ▽ More

    Submitted 13 May, 2013; v1 submitted 27 January, 2013; originally announced January 2013.

    Comments: ISIT 2013, with extended proof

  6. arXiv:1210.2126  [pdf, ps, other

    cs.IT cs.CR

    Lists that are smaller than their parts: A coding approach to tunable secrecy

    Authors: Flavio du Pin Calmon, Muriel Médard, Linda M. Zeger, João Barros, Mark M. Christiansen, Ken. R. Duffy

    Abstract: We present a new information-theoretic definition and associated results, based on list decoding in a source coding setting. We begin by presenting list-source codes, which naturally map a key length (entropy) to list size. We then show that such codes can be analyzed in the context of a novel information-theoretic metric, ε-symbol secrecy, that encompasses both the one-time pad and traditional ra… ▽ More

    Submitted 7 October, 2012; originally announced October 2012.

    Comments: Allerton 2012, 8 pages

  7. Guesswork, large deviations and Shannon entropy

    Authors: Mark M. Christiansen, Ken R. Duffy

    Abstract: How hard is it guess a password? Massey showed that that the Shannon entropy of the distribution from which the password is selected is a lower bound on the expected number of guesses, but one which is not tight in general. In a series of subsequent papers under ever less restrictive stochastic assumptions, an asymptotic relationship as password length grows between scaled moments of the guesswork… ▽ More

    Submitted 21 June, 2012; v1 submitted 18 May, 2012; originally announced May 2012.

    MSC Class: 94A17

    Journal ref: IEEE Transactions on Information Theory, 59 (2), 796-802 2013