Secrecy Enhancement via Public Discussion

نویسنده

  • Alon Orlitsky
چکیده

( X , Y , Z ) is an ensemble of independent random triples, each distributed according to some probability distribution p ( z , y, z) . Two legitimate users, PX having X and Py having Y , communicate in order to agree on a joint key while keeping it almost unknown to an eavesdropper Pz who knows Z . Communication is conducted over a noiseless channel according to a predetermined protocol. Pz hears all transmissions over the channel and knows the protocol used. We show: (1) The legitimate communicators can agree on the secret if and only if they can find one using just two messages. (2) There are cases where a secret can be found, but one message does not suffice. (3) Similar results hold whether the legitimate communicators are required to agree on the secret with probability one or just with high probability.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Multiterminal Secrecy by Public Discussion

This monograph describes principles of information theoretic secrecy generation by legitimate parties with public discussion in the presence of an eavesdropper. The parties are guaranteed secrecy in the form of independence from the eavesdropper’s observation of the communication. Part I develops basic technical tools for secrecy generation, many of which are potentially of independent interest...

متن کامل

Generalized privacy amplification

~ This paper provides a general treatment of privacy amplification by public discussion, a concept introduced by Bennett, Brassard and Robert [l] for a special scenario. The results have applications to unconditionally-secure secret-key agreement protocols, quantum cryptography and to a non-asymptotic and constructive treatment of the secrecy capacity of wire-tap and broadcast channels, even fo...

متن کامل

Computationally Sound Symbolic Secrecy in the Presence of Hash Functions

The standard symbolic, deducibility-based notions of secrecy are in general insufficient from a cryptographic point of view, especially in presence of hash functions. In this paper we devise and motivate a more appropriate secrecy criterion which exactly captures a standard cryptographic notion of secrecy for protocols involving public-key enryption and hash functions: protocols that satisfy it...

متن کامل

The Secrecy Heuristic: Inferring Quality from Secrecy in Foreign Policy Contexts

Three experiments demonstrate that in the context of U.S. foreign policy decision making, people infer informational quality from secrecy. In Experiment 1, people weighed secret information more heavily than public information when making recommendations about foreign political candidates. In Experiment 2, people judged information presented in documents ostensibly produced by the Department of...

متن کامل

Two improved authenticated multiple key exchange protocols

Abastract: Many authenticated multiple key exchange protocols were published in recent years. In 2008, Lee et al. presented an authenticated multiple key exchange protocol based on bilinear pairings. However, Vo et al. demonstrated an impersonation attack on the protocol , and it failed to provide authenticity and perfect forward secrecy as they had claimed. Later, Vo et al. proposed their enha...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011