dc.contributor.author | Medard, Muriel | |
dc.contributor.author | Zeger, Linda M. | |
dc.contributor.author | Barros, Joao | |
dc.contributor.author | Christiansen, Mark M. | |
dc.contributor.author | Duffy, Ken R. | |
dc.contributor.author | Calmon, Flavio du Pin | |
dc.date.accessioned | 2014-09-26T17:19:29Z | |
dc.date.available | 2014-09-26T17:19:29Z | |
dc.date.issued | 2012-10 | |
dc.identifier.isbn | 978-1-4673-4539-2 | |
dc.identifier.isbn | 978-1-4673-4537-8 | |
dc.identifier.isbn | 978-1-4673-4538-5 | |
dc.identifier.uri | http://hdl.handle.net/1721.1/90405 | |
dc.description.abstract | We present a new information-theoretic definition and associated results, based on list decoding in a source coding setting. We begin by presenting list-source codes, which naturally map a key length (entropy) to list size. We then show that such codes can be analyzed in the context of a novel information-theoretic metric, ϵ-symbol secrecy, that encompasses both the one-time pad and traditional rate-based asymptotic metrics, but, like most cryptographic constructs, can be applied in non-aymptotic settings. We derive fundamental bounds for ϵ-symbol secrecy and demonstrate how these bounds can be achieved with MDS codes when the source is uniformly distributed. We discuss applications and implementation issues of our codes. | en_US |
dc.description.sponsorship | United States. Dept. of Defense (Air Force Contract FA8721-05-C-0002) | en_US |
dc.language.iso | en_US | |
dc.publisher | Institute of Electrical and Electronics Engineers (IEEE) | en_US |
dc.relation.isversionof | http://dx.doi.org/10.1109/Allerton.2012.6483380 | en_US |
dc.rights | Creative Commons Attribution-Noncommercial-Share Alike | en_US |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-sa/4.0/ | en_US |
dc.source | arXiv | en_US |
dc.title | Lists that are smaller than their parts: A coding approach to tunable secrecy | en_US |
dc.type | Article | en_US |
dc.identifier.citation | Du Pin Calmon, Flavio, Muriel Medard, Linda M. Zeger, Joao Barros, Mark M. Christiansen, and Ken R. Duffy. “Lists That Are Smaller Than Their Parts: A Coding Approach to Tunable Secrecy.” 2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton) (October 2012). | en_US |
dc.contributor.department | Lincoln Laboratory | en_US |
dc.contributor.department | Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science | en_US |
dc.contributor.mitauthor | Calmon, Flavio du Pin | en_US |
dc.contributor.mitauthor | Medard, Muriel | en_US |
dc.contributor.mitauthor | Zeger, Linda M. | en_US |
dc.relation.journal | Proceedings of the 2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton) | en_US |
dc.eprint.version | Author's final manuscript | en_US |
dc.type.uri | http://purl.org/eprint/type/ConferencePaper | en_US |
eprint.status | http://purl.org/eprint/status/NonPeerReviewed | en_US |
dspace.orderedauthors | du Pin Calmon, Flavio; Medard, Muriel; Zeger, Linda M.; Barros, Joao; Christiansen, Mark M.; Duffy, Ken R. | en_US |
dc.identifier.orcid | https://orcid.org/0000-0003-2912-7972 | |
dc.identifier.orcid | https://orcid.org/0000-0003-4059-407X | |
mit.license | OPEN_ACCESS_POLICY | en_US |
mit.metadata.status | Complete | |