skip to main content
10.1145/3243734.3278517acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
poster

Post-quantum Security using Channel Noise

Published: 15 October 2018 Publication History

Abstract

Post-quantum secure communication has attracted much interest in recent years. Known computationally secure post-quantum key agreement protocols are resource intensive for small devices. These devices may need to securely send frequent short messages, for example to report the measurement of a sensor. Secure communication using physical assumptions provides information-theoretic security (and so quantum-safe) with small computational over-head. Security and efficiency analysis of these systems however is asymptotic. In this poster we consider two secure message communication systems, and derive and compare their security and efficiency for finite length messages. Our results show that these systems indeed provide an attractive alternative for post-quantum security.

References

[1]
Erdem Alkim, Léo Ducas, Thomas Pöppelmann, and Peter Schwabe. 2016. Postquantum Key Exchange-A New Hope. In USENIX Security Symposium, Vol. 2016.
[2]
Mihir Bellare, Stefano Tessaro, and Alexander Vardy. 2012. Semantic security for the wiretap channel. In Advances in Cryptology--CRYPTO 2012. Springer, 294--311.
[3]
Joppe Bos, Craig Costello, Léo Ducas, Ilya Mironov, Michael Naehrig, Valeria Nikolaenko, Ananth Raghunathan, and Douglas Stebila. 2016. Frodo: Take off the ring! practical, quantum-secure key exchange from LWE. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. ACM, 1006--1018.
[4]
Imre Csiszár and Janos Korner. 1978. Broadcast channels with confidential messages. IEEE transactions on information theory 24, 3 (1978), 339--348.
[5]
Hessam Mahdavifar and Alexander Vardy. 2011. Achieving the Secrecy Capacity of Wiretap Channels Using Polar Codes. Information Theory, IEEE Transactions on 57, 10 (Oct 2011), 6428--6443.
[6]
Dustin Moody. 2016. Post-quantum cryptography: NIST's plan for the future. Talk given at PQCrypto 16 (2016).
[7]
Amitav Mukherjee. 2015. Physical-layer security in the internet of things: Sensing and communication confidentiality under resource constraints. Proc. IEEE 103, 10 (2015), 1747--1761.
[8]
Yury Polyanskiy, H Vincent Poor, and Sergio Verdú. 2010. Channel coding rate in the finite blocklength regime. IEEE Transactions on Information Theory 56, 5 (2010), 2307--2359.
[9]
Oded Regev. 2009. On lattices, learning with errors, random linear codes, and cryptography. Journal of the ACM (JACM) 56, 6 (2009), 34.
[10]
F. Lin S. Sharifian and R. Safavi-Naini. 2017. Hash-then-Encode: A Modular Semantically Secure Wiretap Code. In Proceedings of the 2nd Workshop on Communication Security (WCS 2017). Springer.
[11]
Peter W Shor. 1999. Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM review 41, 2 (1999), 303--332.
[12]
Tom Simonite. 2016. Nsa says it "must act now" against the quantum computing threat.
[13]
Ido Tal and Alexander Vardy. 2013. Channel upgrading for semantically-secure encryption on wiretap channels. In Information Theory Proceedings (ISIT), 2013 IEEE International Symposium on. IEEE, 1561--1565.
[14]
Ovidiu Vermesan and Peter Friess. 2013. Internet of things: converging technologies for smart environments and integrated ecosystems. River Publishers.
[15]
Aaron D Wyner. 1975. The wire-tap channel. The bell system technical journal 54, 8 (1975), 1355--1387.

Cited By

View all
  • (2024)Introduction to Quantum Systems and Security Vulnerabilities2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)10.1109/CCNC51664.2024.10454809(345-351)Online publication date: 6-Jan-2024
  • (2023)Securing Data in Multimode Fibers by Exploiting Mode-Dependent Light Propagation EffectsResearch10.34133/research.00656Online publication date: Jan-2023

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
CCS '18: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security
October 2018
2359 pages
ISBN:9781450356930
DOI:10.1145/3243734
Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 15 October 2018

Check for updates

Author Tags

  1. finite-length regime
  2. information-theoretic security
  3. physical-layer security
  4. post-quantum security
  5. wiretap channel

Qualifiers

  • Poster

Conference

CCS '18
Sponsor:

Acceptance Rates

CCS '18 Paper Acceptance Rate 134 of 809 submissions, 17%;
Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

Upcoming Conference

CCS '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)17
  • Downloads (Last 6 weeks)3
Reflects downloads up to 17 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Introduction to Quantum Systems and Security Vulnerabilities2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)10.1109/CCNC51664.2024.10454809(345-351)Online publication date: 6-Jan-2024
  • (2023)Securing Data in Multimode Fibers by Exploiting Mode-Dependent Light Propagation EffectsResearch10.34133/research.00656Online publication date: Jan-2023

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media