Secret-key agreement over unauthenticated public channels II: the simulatability condition

نویسندگان

  • Ueli Maurer
  • Stefan Wolf
چکیده

This is the second part of a three-part paper on secret-key agreement secure against active adversaries. In the first part, we showed that when two parties, willing to generate a secret key, but connected only by a completely insecure communication channel, have access to independent repetitions of some random experiment, then the possibility of secret-key agreement depends on a certain property, called simulatability, of the probability distribution modeling the parties’ initial knowledge. More generally, the simulatability condition is important in the context of identification and authentication among parties sharing some correlated but not necessarily identical partially secret keys. Unfortunately, this condition is a priori not very useful since it is not clear how to decide efficiently whether it is satisfied or not for a given distribution PXY Z . We introduce a new formalism, based on a mechanical model for representing the involved quantities, that allows for dealing with discrete joint distributions of random variables and their manipulations by noisy channels. We show that this representation leads to a simple and efficient characterization of the possibility of secret-key agreement secure against active adversaries.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secret-Key Agreement Over Unauthenticated Public Channels—Part I: Definitions and a Completeness Result

This is the first part of a three-part paper on secret-key agreement secure against active adversaries. In all three parts, we address the question whether two parties, knowing some correlated pieces of information and , respectively, can generate a string about which an adversary, knowing some information and having read and write access to the communication channel used by the legitimate part...

متن کامل

Secret-key agreement over unauthenticated public channels I: Definitions and a completeness result

This is the first part of a three-part paper on secret-key agreement secure against active adversaries. In all three parts, we address the question whether two parties, knowing some correlated pieces of information X and Y , respectively, can generate a string S about which an adversary, knowing some information Z and having read and write access to the communication channel used by the legitim...

متن کامل

Secret-key agreement over unauthenticated public channels III: Privacy amplification

This is the third part of a three-part paper on secret-key agreement secure against active adversaries. Here, we consider the special case where the legitimate partners already share a mutual string which might, however, be partially known to the adversary. The problem of generating a secret key in this case has been well studied in the passive-adversary model—for instance in the context of qua...

متن کامل

Unconditionally Secure Key Distribution Against Active Adversaries

In this report we will give an overview of current results and protocols for unconditional secure keyagreement based on access to shared randomness, see [2, 3, 4], and determine how useful these are in practice, and finally from this propose new open problems that could be looked at in the future. We assume that the reader is familiarly with the concepts of entropy and the passive key-generatio...

متن کامل

Secret-Sharing over Correlated Fast-Fading Multiple-Antenna Channels with Public Discussion

We consider secret-key agreement with public discussion over multiple-input multiple-output (MIMO) Rayleigh fast-fading channels under correlated environment. We assume that transmit, legitimate receiver and eavesdropper antennas are correlated. The legitimate receiver and the eavesdropper are assumed to have perfect channel knowledge while the transmitter has only knowledge of the correlation ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IEEE Trans. Information Theory

دوره 49  شماره 

صفحات  -

تاریخ انتشار 2003