Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Secret key agreement by public discussion from common information

Published: 01 May 1993 Publication History

Abstract

The problem of generating a shared secret key S by two parties knowing dependent random variables X and Y, respectively, but not sharing a secret key initially, is considered. An enemy who knows the random variable Z, jointly distributed with X and Y according to some probability distribution P/sub XYZ/, can also receive all messages exchanged by the two parties over a public channel. The goal of a protocol is that the enemy obtains at most a negligible amount of information about S. Upper bounds on H(S) as a function of P/sub XYZ/ are presented. Lower bounds on the rate H(S)/N (as N to infinity ) are derived for the case in which X=(X/sub 1/, . . ., X/sub N/), Y=(Y/sub 1/, . . ., Y/sub N/) and Z=(Z/sub 1/, . . ., Z/sub N/) result from N independent executions of a random experiment generating X/sub i/, Y/sub i/ and Z/sub i/ for i=1, . . ., N. It is shown that such a secret key agreement is possible for a scenario in which all three parties receive the output of a binary symmetric source over independent binary symmetric channels, even when the enemy's channel is superior to the other two channels.< >

Cited By

View all
  • (2024)A dynamic symmetric key generation at wireless link layer: information-theoretic perspectivesEURASIP Journal on Wireless Communications and Networking10.1186/s13638-024-02396-y2024:1Online publication date: 27-Aug-2024
  • (2024)A powerful adversary model and corresponding OTP time slot allocation scheme in RIS-assisted physical layer key generationEURASIP Journal on Wireless Communications and Networking10.1186/s13638-024-02384-22024:1Online publication date: 11-Jul-2024
  • (2024)Communication Complexity of the Secret Key Agreement in Algorithmic Information TheoryACM Transactions on Computation Theory10.1145/366516316:3(1-37)Online publication date: 17-May-2024
  • Show More Cited By
  1. Secret key agreement by public discussion from common information

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image IEEE Transactions on Information Theory
    IEEE Transactions on Information Theory  Volume 39, Issue 3
    May 1993
    394 pages

    Publisher

    IEEE Press

    Publication History

    Published: 01 May 1993

    Qualifiers

    • Research-article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 03 Oct 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)A dynamic symmetric key generation at wireless link layer: information-theoretic perspectivesEURASIP Journal on Wireless Communications and Networking10.1186/s13638-024-02396-y2024:1Online publication date: 27-Aug-2024
    • (2024)A powerful adversary model and corresponding OTP time slot allocation scheme in RIS-assisted physical layer key generationEURASIP Journal on Wireless Communications and Networking10.1186/s13638-024-02384-22024:1Online publication date: 11-Jul-2024
    • (2024)Communication Complexity of the Secret Key Agreement in Algorithmic Information TheoryACM Transactions on Computation Theory10.1145/366516316:3(1-37)Online publication date: 17-May-2024
    • (2024)Reconfigurable Intelligent Surface-Assisted Secret Key Generation in Spatially Correlated ChannelsIEEE Transactions on Wireless Communications10.1109/TWC.2023.329607623:3(2153-2166)Online publication date: 1-Mar-2024
    • (2024)On the Information Theoretic Secure Aggregation With Uncoded Groupwise KeysIEEE Transactions on Information Theory10.1109/TIT.2024.342208770:9(6596-6619)Online publication date: 2-Jul-2024
    • (2024)Communication Complexity of Common Randomness Generation With Isotropic StatesIEEE Transactions on Information Theory10.1109/TIT.2024.339536770:8(5681-5691)Online publication date: 1-Aug-2024
    • (2024)The Capacity Region of Information Theoretic Secure Aggregation With Uncoded Groupwise KeysIEEE Transactions on Information Theory10.1109/TIT.2024.339374070:10(6932-6949)Online publication date: 1-Oct-2024
    • (2024)Distributed Secret Sharing Over a Public Channel From Correlated Random VariablesIEEE Transactions on Information Theory10.1109/TIT.2024.336364470:4(2851-2869)Online publication date: 1-Apr-2024
    • (2024)Secure Summation: Capacity Region, Groupwise Key, and FeasibilityIEEE Transactions on Information Theory10.1109/TIT.2023.334257170:2(1376-1387)Online publication date: 1-Feb-2024
    • (2024)Message Transmission and Common Randomness Generation Over MIMO Slow Fading Channels With Arbitrary Channel State DistributionIEEE Transactions on Information Theory10.1109/TIT.2023.331537770:1(256-281)Online publication date: 1-Jan-2024
    • Show More Cited By

    View Options

    View options

    Get Access

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media