[Resource Topic] 2023/1270: Computational Wiretap Coding from Indistinguishability Obfuscation

Welcome to the resource topic for 2023/1270

Title:
Computational Wiretap Coding from Indistinguishability Obfuscation

Authors: Yuval Ishai, Aayush Jain, Paul Lou, Amit Sahai, Mark Zhandry

Abstract:

A wiretap coding scheme for a pair of noisy channels (\mathsf{ChB},\mathsf{ChE}) enables Alice to reliably communicate a message to Bob by sending its encoding over \mathsf{ChB}, while hiding the message from an adversary Eve who obtains the same encoding over \mathsf{ChE}.

A necessary condition for the feasibility of wiretap coding is that \mathsf{ChB} is not a degradation of \mathsf{ChE}, namely Eve cannot simulate Bob’s view. While insufficient in the information-theoretic setting, a recent work of Ishai, Korb, Lou, and Sahai (Crypto 2022) showed that the non-degradation condition is sufficient in the computational setting, assuming idealized flavors of obfuscation. The question of basing a similar feasibility result on standard cryptographic assumptions was left open, even in simple special cases.

In this work, we settle the question for all discrete memoryless channels where the (common) input alphabet of \mathsf{ChB} and \mathsf{ChE} is binary, and with arbitrary finite output alphabet, under standard (sub-exponential) hardness assumptions: namely those assumptions that imply indistinguishability obfuscation (Jain-Lin-Sahai 2021, 2022), and injective PRGs. In particular, this establishes the feasibility of computational wiretap coding when \mathsf{ChB} is a binary symmetric channel with crossover probability p and \mathsf{ChE} is a binary erasure channel with erasure probability e, where e>2p.

On the information-theoretic side, our result builds on a new polytope characterization of channel degradation for pairs of binary-input channels, which may be of independent interest.

ePrint: https://eprint.iacr.org/2023/1270

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .