Information-Theoretic Secret-Key Agreement: The Asymptotically Tight Relation Between the Secret-Key Rate and the Channel Quality Ratio

被引:5
|
作者
Jost, Daniel [1 ]
Maurer, Ueli [1 ]
Ribeiro, Joao L. [2 ]
机构
[1] Swiss Fed Inst Technol, Dept Comp Sci, CH-8092 Zurich, Switzerland
[2] Imperial Coll London, Dept Comp, London SW7 2AZ, England
来源
关键词
D O I
10.1007/978-3-030-03807-6_13
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Information-theoretic secret-key agreement between two parties Alice and Bob is a well-studied problem that is provably impossible in a plain model with public (authenticated) communication, but is known to be possible in a model where the parties also have access to some correlated randomness. One particular type of such correlated randomness is the so-called satellite setting, where uniform random bits (e.g., sent by a satellite) are received by the parties and the adversary Eve over inherently noisy channels. The antenna size determines the error probability, and the antenna is the adversary's limiting resource much as computing power is the limiting resource in traditional complexity-based security. The natural assumption about the adversary is that her antenna is at most Q times larger than both Alice's and Bob's antenna, where, to be realistic, Q can be very large. The goal of this paper is to characterize the secret-key rate per transmitted bit in terms of Q. Traditional results in this so-called satellite setting are phrased in terms of the error probabilities epsilon(A), epsilon(B), and epsilon(E), of the binary symmetric channels through which the parties receive the bits and, quite surprisingly, the secret-key rate has been shown to be strictly positive unless Eve's channel is perfect (epsilon(E) = 0) or either Alice's or Bob's channel output is independent of the transmitted bit (i.e., epsilon(A) = 0.5 or epsilon(B) = 0.5). However, the best proven lower bound, if interpreted in terms of the channel quality ratio Q, is only exponentially small in Q. The main result of this paper is that the secret-key rate decreases asymptotically only like 1/Q(2) if the per-bit signal energy, affecting the quality of all channels, is treated as a system parameter that can be optimized. Moreover, this bound is tight if Alice and Bob have the same antenna sizes. Motivated by considering a fixed sending signal power, in which case the per-bit energy is inversely proportional to the bit-rate, we also propose a definition of the secret-key rate per second (rather than per transmitted bit) and prove that it decreases asymptotically only like 1/Q.
引用
收藏
页码:345 / 369
页数:25
相关论文
共 50 条
  • [1] MIMO transmissions with information-theoretic secrecy for secret-key agreement in wireless networks
    Li, Xiaohua
    Ratazzi, E. Paul
    [J]. MILCOM 2005 - 2005 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-5, 2005, : 1353 - 1359
  • [2] Secret-Key Agreement With Channel State Information at the Transmitter
    Khisti, Ashish
    Diggavi, Suhas N.
    Wornell, Gregory W.
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (03) : 672 - 681
  • [3] Strong security against active attacks in information-theoretic secret-key agreement
    Wolf, S
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT'98, 1998, 1514 : 405 - 419
  • [4] An authentication scheme over non-authentic public channel in information-theoretic secret-key agreement
    Liu, SL
    Wang, YM
    [J]. APPLIED ALGEBRA, ALGEBRAIC ALGORITHMS AND ERROR-CORRECTING CODES, PROCEEDINGS, 1999, 1719 : 294 - 301
  • [5] Space-time transmissions for wireless secret-key agreement with. information-theoretic secrecy
    Li, XH
    Chen, M
    Ratazzi, EP
    [J]. 2005 IEEE 6th Workshop on Signal Processing Advances in Wireless Communications, 2005, : 811 - 815
  • [6] Multivariate Mutual Information Inspired by Secret-Key Agreement
    Chan, Chung
    Al-Bashabsheh, Ali
    Ebrahimi, Javad B.
    Kaced, Tarik
    Liu, Tie
    [J]. PROCEEDINGS OF THE IEEE, 2015, 103 (10) : 1883 - 1913
  • [7] Methodologies of Secret-Key Agreement Using Wireless Channel Characteristics
    Syed Taha Ali
    Vijay Sivaraman
    [J]. ZTE Communications, 2013, 11 (03) : 20 - 25
  • [8] An Information Reconciliation Protocol for Secret-Key Agreement with Small Leakage
    Pacher, Christoph
    Grabenweger, Philipp
    Martinez-Mateo, Jesus
    Martin, Vicente
    [J]. 2015 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2015, : 730 - 734
  • [9] Covert Secret-Key Agreement Protocol Based on the Underwater Acoustic Channel
    Xu, Ming
    Feng, Hexin
    Liu, Ling
    [J]. IEEE WIRELESS COMMUNICATIONS LETTERS, 2022, 11 (07) : 1384 - 1388
  • [10] A secret-key exponential key agreement protocol with smart cards
    Yoon, Eun-Jun
    Yoo, Kee-Young
    [J]. AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2007, 4610 : 430 - +