On Tightness of Mutual Dependence Upperbound for Secret-key Capacity of Multiple Terminals

نویسنده

  • Chung Chan
چکیده

Csiszàr and Narayan[3] show that the secret-key capacity CSK(A) with unlimited public discussion and the smallest achievable rate RCO(A) of communication for omniscience of a group A of at least two active users sum up to the entropy rate H(XM) of the discrete multiple memoryless sources (Xi, i ∈ M) for all terminals M ⊃ A. They then derive a heuristically appealing upperbound[3, (26)] on the secret-key capacity in the form of the information divergence from joint to product probability measure commonly interpreted as the mutual dependence of a set of random variables. Tightness of this bound would confirm its heuristic interpretation with the operational meaning of the secret-key capacity, i.e. the maximum mutual consensus among the active users that need not be explicitly described in public. While one can easily check that the bound is tight for any system with three or less users, testing the case with more users quickly becomes unmanageable. Yet, there is no apparent reason, other than its heuristic interpretation, that the bound is tight, nor is there a counter-example that suggests otherwise. This paper proves that the bound is indeed tight when all users are active, i.e. A = M, as a consequence of the polymatroidal structure[6] underlying the source coding problem. This already confirms the heuristic interpretation of the bound as a measure of mutual dependence of random variables. For the other case when some users are helpers, i.e. A ( M, there is a counterexample with three active users and three helpers for which the bound is loose.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Information-Theoretic Key Agreement of Multiple Terminals - Part II: Channel Model

This is the second part of a two-part paper on information-theoretically secure secret key agreement. This part covers the secret key capacity under the channel model. In this model, multiple terminals wish to create a shared secret key that is secure from an eavesdropper with unlimited computational resources. The terminals are all connected to a noiseless and authenticated but unsecure channe...

متن کامل

Information-theoretic key agreement of multiple terminals: part I

We study the problem of information-theoretically secure secret key agreement under the well-known source model and channel model. In both of these models multiple terminals wish to create a shared secret key that is secure from an eavesdropper with unlimited computational resources. The terminals are all connected to a noiseless and authenticated but public communication channel. The terminals...

متن کامل

Computationally secure multiple secret sharing: models, schemes, and formal security analysis

A multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants. in such a way a multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants, such that any authorized subset of participants can reconstruct the secrets. Up to now, existing MSSs either require too long shares for participants to be perfect secur...

متن کامل

Information Theoretic Secret Key Generation: Structured codes and Tree Packing

Title of dissertation: INFORMATION THEORETIC SECRET KEY GENERATION: STRUCTURED CODES AND TREE PACKING Sirin Nitinawarat, Doctor of Philosophy, 2010 Dissertation directed by: Professor Prakash Narayan Department of Electrical and Computer Engineering Institute for Systems Research This dissertation deals with a multiterminal source model for secret key generation by multiple network terminals wi...

متن کامل

Information-Theoretic Key Agreement of Multiple Terminals - Part I: Source Model

This is the first part of a two-part paper on information-theoretically secure secret key agreement. In this part, we study the secrecy problem under the widely studied source model. In the source model the terminals wishing to generate a secret key, as well as the eavesdropper, receive the respective coordinates of a block of independent and identically distributed copies of jointly distribute...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • CoRR

دوره abs/0805.3200  شماره 

صفحات  -

تاریخ انتشار 2008