Show simple item record

dc.contributor.authorChristiansen, Mark M.
dc.contributor.authorDuffy, Ken R.
dc.contributor.authorMedard, Muriel
dc.contributor.authorCalmon, Flavio du Pin
dc.date.accessioned2018-02-05T19:18:40Z
dc.date.available2018-02-05T19:18:40Z
dc.date.issued2015-10
dc.identifier.issn0018-9448
dc.identifier.issn1557-9654
dc.identifier.urihttp://hdl.handle.net/1721.1/113425
dc.description.abstractThe guesswork problem was originally motivated by a desire to quantify computational security for single user systems. Leveraging recent results from its analysis, we extend the remit and utility of the framework to the quantification of the computational security of multi-user systems. In particular, assume that V users independently select strings stochastically from a finite, but potentially large, list. An inquisitor who does not know which strings have been selected wishes to identify U of them. The inquisitor knows the selection probabilities of each user and is equipped with a method that enables the testing of each (user, string) pair, one at a time, for whether that string had been selected by that user. Here, we establish that, unless U=V, there is no general strategy that minimizes the distribution of the number of guesses, but in the asymptote as the strings become long we prove the following: by construction, there is an asymptotically optimal class of strategies; the number of guesses required in an asymptotically optimal strategy satisfies a large deviation principle with a rate function, which is not necessarily convex, that can be determined from the rate functions of optimally guessing individual users' strings; if all users' selection statistics are identical, the exponential growth rate of the average guesswork as the string-length increases is determined by the specific Rényi entropy of the string-source with parameter (V-U+1)/(V-U+2), generalizing the known V=U=1 case; and that the Shannon entropy of the source is a lower bound on the average guesswork growth rate for all U and V, thus providing a bound on computational security for multi-user systems. Examples are presented to illustrate these results and their ramifications for systems design.en_US
dc.language.isoen_US
dc.publisherInstitute of Electrical and Electronics Engineers (IEEE)en_US
dc.relation.isversionofhttp://dx.doi.org/10.1109/tit.2015.2482972en_US
dc.rightsCreative Commons Attribution-Noncommercial-Share Alikeen_US
dc.rights.urihttp://creativecommons.org/licenses/by-nc-sa/4.0/en_US
dc.sourcearXiven_US
dc.titleMulti-User Guesswork and Brute Force Securityen_US
dc.typeArticleen_US
dc.identifier.citationChristiansen, Mark M., et al. “Multi-User Guesswork and Brute Force Security.” IEEE Transactions on Information Theory, vol. 61, no. 12, Dec. 2015, pp. 6876–86.en_US
dc.contributor.departmentMassachusetts Institute of Technology. Department of Electrical Engineering and Computer Scienceen_US
dc.contributor.mitauthorMedard, Muriel
dc.contributor.mitauthorCalmon, Flavio du Pin
dc.relation.journalIEEE Transactions on Information Theoryen_US
dc.eprint.versionAuthor's final manuscripten_US
dc.type.urihttp://purl.org/eprint/type/JournalArticleen_US
eprint.statushttp://purl.org/eprint/status/PeerRevieweden_US
dspace.orderedauthorsChristiansen, Mark M.; Duffy, Ken R.; du Pin Calmon, Flavio; Medard, Murielen_US
dspace.embargo.termsNen_US
dc.identifier.orcidhttps://orcid.org/0000-0003-4059-407X
dc.identifier.orcidhttps://orcid.org/0000-0003-2912-7972
mit.licenseOPEN_ACCESS_POLICYen_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record