We gratefully acknowledge support from
the Simons Foundation and member institutions.
Full-text links:

Download:

Current browse context:

cs.IT

Change to browse by:

References & Citations

DBLP - CS Bibliography

Bookmark

(what is this?)
CiteULike logo BibSonomy logo Mendeley logo del.icio.us logo Digg logo Reddit logo ScienceWISE logo

Computer Science > Information Theory

Title: Secure list decoding and its application to bit-string commitment

Abstract: We propose a new concept of secure list decoding, which is related to bit-string commitment. While the conventional list decoding requires that the list contains the transmitted message, secure list decoding requires the following additional security conditions to work as a modification of bit-string commitment. The first additional security condition is the receiver's uncertainty for the transmitted message, which is stronger than the impossibility of the correct decoding, even though the transmitted message is contained in the list. The other additional security condition is the impossibility for the sender to estimate another element of the decoded list except for the transmitted message. The first condition is evaluated by the equivocation rate. The asymptotic property is evaluated by three parameters, the rates of the message and list sizes, and the equivocation rate. We derive the capacity region of this problem. We show that the combination of hash function and secure list decoding yields the conventional bit-string commitment. Our results hold even when the input and output systems are general probability spaces including continuous systems. When the input system is a general probability space, we formulate the abilities of the honest sender and the dishonest sender in a different way.
Comments: This paper is a different paper from arXiv:1901.02590 as follows. (1) The definition of secure list decoding of this paper contains the equivocation rate while arXiv:1901.02590 does not consider it. (2) This paper shows that our secure list decoding can be applied to bit-string commitment while the paper arXiv:1901.02590 does not consider it
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
Cite as: arXiv:2103.11548 [cs.IT]
  (or arXiv:2103.11548v2 [cs.IT] for this version)

Submission history

From: Masahito Hayashi [view email]
[v1] Mon, 22 Mar 2021 02:42:45 GMT (37kb)
[v2] Sat, 23 Apr 2022 07:31:39 GMT (95kb,D)

Link back to: arXiv, form interface, contact.