New Bounds on the Information-Theoretic Key Agreement of Multiple Terminals

被引:5
|
作者
Gohari, Amin Aminzadeh [1 ]
Anantharam, Venkat [1 ]
机构
[1] Univ Calif Berkeley, Dept EECS, Berkeley, CA 94720 USA
关键词
D O I
10.1109/ISIT.2008.4595085
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We study the problem of information-theoretically secure secret key agreement under the well-known source model and channel model. In both of these models the parties wish to create a shared secret key that is secure from an eavesdropper with unlimited computational resources. In the channel model, the first party can choose a sequence of inputs to a discrete memoryless channel, which has outputs at the other parties and at the eavesdropper. After each channel use, the parties can engage in arbitrarily many rounds of interactive authenticated communication over a public channel. At the end, each party should be able to generate the key. In the source model, the parties wishing to generate a secret key (as well as the eavesdropper) receive a certain number of independent identically distributed copies of jointly distributed random variables after which the parties are allowed interactive authenticated public communication, at the end of which each party should be able to generate the key. We derive new lower and upper bounds on the secret key rate under the source model and the channel model, and introduce a technique for proving that a given expression bounds the secrecy rate from above in the channel model. Our lower bounds strictly improve what is essentially the best known lower bound in both the source model and the channel model. Our upper bound in the channel model strictly improves the current state of art upper bound. We do not know whether our new upper bound in the source model represents an strict improvement but it includes the current best known bound as a special case.
引用
收藏
页码:742 / 746
页数:5
相关论文
共 50 条
  • [21] Information-Theoretic Lower Bounds for Distributed Function Computation
    Xu, Aolin
    Raginsky, Maxim
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2017, 63 (04) : 2314 - 2337
  • [22] Information-theoretic upper and lower bounds for statistical estimation
    Zhang, T
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2006, 52 (04) : 1307 - 1321
  • [23] Information-theoretic bounds on average signal transition activity
    Ramprasad, S
    Shanbhag, NR
    Hajj, IN
    [J]. IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 1999, 7 (03) : 359 - 368
  • [24] Information-theoretic Bounds of Resampling Forensics: New Evidence for Traces Beyond Cyclostationarity
    Pasquini, Cecilia
    Boehme, Rainer
    [J]. IH&MMSEC'17: PROCEEDINGS OF THE 2017 ACM WORKSHOP ON INFORMATION HIDING AND MULTIMEDIA SECURITY, 2017, : 3 - 14
  • [25] Information-Theoretic Bounds for the Forensic Detection of Downscaled Signals
    Pasquini, Cecilia
    Boehme, Rainer
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (07) : 1928 - 1943
  • [26] Information-Theoretic Bounds on Quantum Advantage in Machine Learning
    Huang, Hsin-Yuan
    Kueng, Richard
    Preskill, John
    [J]. PHYSICAL REVIEW LETTERS, 2021, 126 (19)
  • [27] Information-Theoretic Regret Bounds for Bandits with Fixed Expert Advice
    Eldowa, Khaled
    Cesa-Bianchi, Nicolo
    Metelli, Alberto Maria
    Restelli, Marcello
    [J]. 2023 IEEE INFORMATION THEORY WORKSHOP, ITW, 2023, : 30 - 35
  • [28] Information-theoretic lower bounds for convex optimization with erroneous oracles
    Singer, Yaron
    Vondrak, Jan
    [J]. ADVANCES IN NEURAL INFORMATION PROCESSING SYSTEMS 28 (NIPS 2015), 2015, 28
  • [29] Trade-Offs in Information-Theoretic Multi-party One-Way Key Agreement
    Renner, Renato
    Wolf, Stefan
    Wullschleger, Juerg
    [J]. INFORMATION THEORETIC SECURITY, 2009, 4883 : 65 - +
  • [30] New Techniques for Localization Based Information Theoretic Secret Key Agreement
    Kazempour, Narges
    Mirmohseni, Mahtab
    Aref, Mohammad Reza
    [J]. 2017 14TH INTERNATIONAL ISC (IRANIAN SOCIETY OF CRYPTOLOGY) CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2017, : 70 - 76