Linking information reconciliation and privacy amplification

被引:116
|
作者
Cachin, C
Maurer, UM
机构
[1] Institute for Theoretical Computer Science, ETH Zürich
关键词
unconditional security; reconciliation; information reduction; privacy amplification; Renyi entropy; secret-key agreement; quantum cryptography;
D O I
10.1007/s001459900023
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Information reconciliation allows two parties knowing correlated random variables, such as a noisy version of the partner's random bit string, to agree ori a shared string. Privacy amplification allows two parties sharing a partially secret string about which an opponent has some partial information, to distill a shorter but almost completely secret key by communicating only over an insecure channel, as long as an upper bound on the opponent's knowledge about the string is known. The relation between these two techniques has not been well understood. In particular, it is important to understand the effect of side-information, obtained by the opponent through an initial reconciliation step, on the size of the secret key that can be distilled safely by subsequent privacy amplification. The purpose of this paper is to provide the missing link between these techniques by presenting bounds on the reduction of the Renyi entropy of a random variable induced by side-information. We show that, except with negligible probability, each bit of side-information reduces the size of the key that can be safely distilled by at most two bits. Moreover, in the important special case of side-information and raw key data generated by many independent repetitions of a random experiment, each bit of side-information reduces the size of the secret key by only about one bit. The results have applications in unconditionally secure key agreement protocols and in quantum cryptography.
引用
收藏
页码:97 / 110
页数:14
相关论文
共 50 条
  • [1] Linking information reconciliation and privacy amplification
    Christian Cachin
    Ueli M. Maurer
    Journal of Cryptology, 1997, 10 : 97 - 110
  • [2] Simple and tight bounds for information reconciliation and privacy amplification
    Renner, R
    Wolf, S
    ADVANCES IN CRYPTOLOGY ASIACRYPT 2005, 2005, 3788 : 199 - 216
  • [3] Noisy Channel Coding via Privacy Amplification and Information Reconciliation
    Renes, Joseph M.
    Renner, Renato
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2011, 57 (11) : 7377 - 7385
  • [4] Information Privacy Concerns: Linking Individual Perceptions with Institutional Privacy Assurances
    Xu, Heng
    Dinev, Tamara
    Smith, Jeff
    Hart, Paul
    JOURNAL OF THE ASSOCIATION FOR INFORMATION SYSTEMS, 2011, 12 (12): : 798 - 824
  • [5] Information privacy concerns: Linking individual perceptions with institutional privacy assurances
    Xu H.
    Dinev T.
    Smith J.
    Hart P.
    Journal of the Association for Information Systems, 2011, 12 (12) : 798 - 824
  • [6] Information Security Control Theory: Achieving a Sustainable Reconciliation Between Sharing and Protecting the Privacy of Information
    Anderson, Chad
    Baskerville, Richard L.
    Kaul, Mala
    JOURNAL OF MANAGEMENT INFORMATION SYSTEMS, 2017, 34 (04) : 1082 - 1112
  • [7] Physical Layer Security against an Informed Eavesdropper in Underwater Acoustic Channels: Reconciliation and Privacy Amplification
    Sklivanitis, George
    Pelekanakis, Konstantinos
    Yildirim, Seckin Anil
    Petroccia, Roberto
    Alves, Joao
    Pados, Dimitris A.
    2021 FIFTH UNDERWATER COMMUNICATIONS AND NETWORKING CONFERENCE (UCOMMS), 2021,
  • [8] Expurgation Exponent of Leaked Information in Privacy Amplification for Binary Sources
    Watanabe, Shun
    2012 IEEE INFORMATION THEORY WORKSHOP (ITW), 2012, : 401 - 405
  • [9] Amplifying Privacy in Privacy Amplification
    Aggarwal, Divesh
    Dodis, Yevgeniy
    Jafargholi, Zahra
    Miles, Eric
    Reyzin, Leonid
    ADVANCES IN CRYPTOLOGY - CRYPTO 2014, PT II, 2014, 8617 : 183 - 198
  • [10] Exponential Decreasing Rate of Leaked Information in Universal Random Privacy Amplification
    Hayashi, Masahito
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2011, 57 (06) : 3989 - 4001