be willing to trade perfect secrecy for efficiency, and
our analysis shows how to do it safely.
The key observation made in this paper is that
perfect security can be created from arbitrarily weak
primitives in the sense that we do not need to be se-
cure in all cases, but only in an arbitrarily small frac-
tion of cases. In other words, once a – perhaps ex-
pensive – information-theoretically secure primitive
is available, we can easily turn it into a perfectly se-
cure and cheap system. The example application in
this paper will be private communication based on
multipath transmission.
Related Work: As we are after information-theoretic
secrecy, this work is closely related to information-
theory based cryptography, as well as conventional
cryptography. While previous approaches to perfectly
secure communication are mostly concrete ad-hoc so-
lutions, our contribution is a generic framework to
cook up a secure and efficient protocol from ingre-
dients that do not enjoy both features at the same
time. This is the major difference to the related
literature, as generic constructions are hardly avail-
able, if not absent at all. Generic constructions (to
which our results belong), are found rarely and widely
scattered throughout the literature (see the work of
(Fitzi et al., 2007; Srinathan et al., 2004) and refer-
ences therein; both of which can be used with our
generic construction). Among the few articles con-
cerned with generic security constructions are (Gu
et al., 2005), focusing on modeling mostly, (Noman,
2008), assuming a specific field of application, and
(Poels et al., 2005), hinging on a particular compu-
tational model. Our work is not restricted in any of
these ways, besides being about secure communica-
tion. In particular, our results can be used to make
otherwise costly primitives efficient, e.g. (Alomair
and Poovendran, 2009; Hanaoka et al., 2005; Kuro-
sawa and Suzuki, 2007). As far as conventional cryp-
tography is concerned, we will make use of a special
block-cipher mode, known as all-or-nothing transfor-
mation (AONT). This concept has been introduced in
(Rivest, 1997) and further studied in (Stinson, 2001).
Notably for us is also the field of leakage-resilient
cryptography (Alwen et al., 2009), though we deal
with Shannon-information leakage rather than phys-
ical attacks (through side-channels for instance). Our
work pursues similar goals as leakage-resilient cryp-
tography, yet uses different tools for that. In particu-
lar, we will utilize the framework of game-theoretic
security analysis, as proposed in (Rass and Schart-
ner, 2010). This approach will come handy and is,
for convenience of the reader, sketched in section 3,
stressing an example and repeating the basic results
required here.
Organization of the paper: we describe our security
and adversary model in section 2. In particular, we
will be after information-theoretic security, not call-
ing for any infeasibility conjectures. As the employed
framework is non-standard and thus not well-known,
we will use section 3 to describe how game-theory
can be used for security analysis of multipath trans-
mission. In particular, section 3.2 contains a brief
introduction to the theory of matrix games, which is
needed in the sequel. Our main result is the generic
construction given in section 4, along with the secu-
rity analysis culminating in theorem 4.2.
2 ADVERSARY AND SECURITY
MODEL
We assume a computationally unbounded passive
threshold adversary. That is, given a graph G = (V,E)
modeling the network at hand, at most t ≤ |V \ {s,r}|
nodes (excluding the sender s and receiver r) are un-
der control of an attacker. Without loss of generality,
we may assume the channels (u,v) ∈ E to be perfectly
protected, for otherwise we could simply insert an in-
termediate node w as u—w—v, whose compromis-
sion models an attack on the u—v-link.
The honest parties transmit a secret message M
from a sender s ∈ V to a non-adjacent receiver r ∈ V,
according to some protocol Π
x
(M), taking random
coin-flips x. Let trans(Π
x
(M)) denote the protocol
transcript, i.e. the set of all data that travels over
the network when the secret message M is sent us-
ing the parameters x. The adversary is assumed to
know the protocol Π, the network infrastructure, but
not the random coin-flips x (taking multipath trans-
mission as our case-study, this assumption is justified
since the parameter x is a local and thus secret input at
the sender’s side). Having a subset of nodes in G un-
der control, the adversary’s view isC ⊆ trans(Π
x
(M))
As the adversary is passive, we are not concerned
with reliability, and our main goals are privacy and
low bandwidth demand for the transmission from s
to r. In alignment with Shannon’s model of secret
communication (Shannon, 1949), the source s is a
Markov-process, drawing secret messages from its
stationary distribution.
Definition 2.1 (Security). Let Π
x
(M) be a protocol
using random coin-flips (protocol parameters) x for
transmitting a secret message M over a network. Let
the adversary’s view be C ⊆ trans(Π
x
(M)).
We call the protocol Π secure, if for any given ε >
0, one can choose (protocol parameters) x so that the
mutual information is I(M;C) < ε.
INFORMATION-LEAKAGE IN HYBRID RANDOMIZED PROTOCOLS
135