Linking information reconciliation and privacy amplification

被引:116
|
作者
Cachin, C
Maurer, UM
机构
[1] Institute for Theoretical Computer Science, ETH Zürich
关键词
unconditional security; reconciliation; information reduction; privacy amplification; Renyi entropy; secret-key agreement; quantum cryptography;
D O I
10.1007/s001459900023
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Information reconciliation allows two parties knowing correlated random variables, such as a noisy version of the partner's random bit string, to agree ori a shared string. Privacy amplification allows two parties sharing a partially secret string about which an opponent has some partial information, to distill a shorter but almost completely secret key by communicating only over an insecure channel, as long as an upper bound on the opponent's knowledge about the string is known. The relation between these two techniques has not been well understood. In particular, it is important to understand the effect of side-information, obtained by the opponent through an initial reconciliation step, on the size of the secret key that can be distilled safely by subsequent privacy amplification. The purpose of this paper is to provide the missing link between these techniques by presenting bounds on the reduction of the Renyi entropy of a random variable induced by side-information. We show that, except with negligible probability, each bit of side-information reduces the size of the key that can be safely distilled by at most two bits. Moreover, in the important special case of side-information and raw key data generated by many independent repetitions of a random experiment, each bit of side-information reduces the size of the secret key by only about one bit. The results have applications in unconditionally secure key agreement protocols and in quantum cryptography.
引用
收藏
页码:97 / 110
页数:14
相关论文
共 50 条
  • [31] Information privacy/information property
    Litman, J
    STANFORD LAW REVIEW, 2000, 52 (05) : 1283 - 1313
  • [32] Privacy Amplification by Subsampling in Time Domain
    Koga, Tatsuki
    Meehan, Casey
    Chaudhuri, Kamalika
    INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND STATISTICS, VOL 151, 2022, 151
  • [33] Privacy Amplification and Decoupling Without Smoothing
    Dupuis, Frederic
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2023, 69 (12) : 7784 - 7792
  • [34] Privacy Amplification in the Isolated Qubits Model
    Liu, Yi-Kai
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2015, PT II, 2015, 9057 : 785 - 814
  • [35] Mosaics of combinatorial designs for privacy amplification
    Wiese, Moritz
    Boche, Holger
    2021 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2021, : 1630 - 1635
  • [36] Stream Privacy Amplification for Quantum Cryptography
    Huang, Yizhi
    Zhang, Xingjian
    Ma, Xiongfeng
    PRX QUANTUM, 2022, 3 (02):
  • [37] Privacy Amplification by Mixing and Diffusion Mechanisms
    Balle, Borja
    Barthe, Gilles
    Gaboardi, Marco
    Geumlek, Joseph
    ADVANCES IN NEURAL INFORMATION PROCESSING SYSTEMS 32 (NIPS 2019), 2019, 32
  • [38] Privacy Amplification: Recent Developments and Applications
    Yang, Wei
    Schaefer, Rafael F.
    Poor, H. Vincent
    PROCEEDINGS OF 2018 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA2018), 2018, : 120 - 124
  • [39] Privacy amplification for quantum key distribution
    Watanabe, Yodai
    JOURNAL OF PHYSICS A-MATHEMATICAL AND THEORETICAL, 2007, 40 (03) : F99 - F104
  • [40] Equivalence of Three Classical Algorithms With Quantum Side Information: Privacy Amplification, Error Correction, and Data Compression
    Tsurumaru, Toyohiro
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2022, 68 (02) : 1016 - 1031