Information-Theoretic Key Agreement of Multiple Terminals - Part I: Source Model

نویسندگان

  • Amin Aminzadeh Gohari
  • Venkat Anantharam
چکیده

This is the first part of a two-part paper on information-theoretically secure secret key agreement. In this part, we study the secrecy problem under the widely studied source model. In the source model the terminals wishing to generate a secret key, as well as the eavesdropper, receive the respective coordinates of a block of independent and identically distributed copies of jointly distributed random variables, after which the terminals are allowed interactive authenticated public communication, at the end of which each terminal should be able to generate the key. We derive a new upper bound on the secrecy capacity that strictly improves the currently best upper bound, due to Renner and Wolf. Further, while the RennerWolf bound is defined only in the case of two terminals, the new upper bound applies to the general multi-terminal case. The technique used for deriving our bound is to find certain properties of functions of joint probability distributions which will imply that they dominate the secrecy capacity, and then prove the bound by a verification argument. We also define a problem of communication for omniscience by a neutral observer and establish the equivalence between this new problem and the problem of secret key agreement. This generalizes an earlier result of Csiszár and Narayan. Finally, we prove a new lower bound on the secrecy capacity in the general multi-terminal case that in the two terminal case is strictly better than what is essentially the currently best known lower bound, namely the maximum of the two one-way secrecy capacities.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Information-theoretic key agreement of multiple terminals: part I

We study the problem of information-theoretically secure secret key agreement under the well-known source model and channel model. In both of these models multiple terminals wish to create a shared secret key that is secure from an eavesdropper with unlimited computational resources. The terminals are all connected to a noiseless and authenticated but public communication channel. The terminals...

متن کامل

Information-Theoretic Key Agreement of Multiple Terminals - Part II: Channel Model

This is the second part of a two-part paper on information-theoretically secure secret key agreement. This part covers the secret key capacity under the channel model. In this model, multiple terminals wish to create a shared secret key that is secure from an eavesdropper with unlimited computational resources. The terminals are all connected to a noiseless and authenticated but unsecure channe...

متن کامل

Information-theoretic key agreement of multiple terminal: part II: channel model

This is the second part of a two-part paper on information-theoretically secure secret key agreement. This paper focuses on the secret key rate problem under the channel model. In the channel model, a set of two or more terminals wish to create a shared secret key that is information-theoretically secure from an eavesdropper. The first terminal can choose a sequence of inputs to a discrete memo...

متن کامل

Title of dissertation : INFORMATION THEORETIC GENERATION OF MULTIPLE SECRET KEYS

Title of dissertation: INFORMATION THEORETIC GENERATION OF MULTIPLE SECRET KEYS Chunxuan Ye, Doctor of Philosophy, 2005 Dissertation directed by: Professor Prakash Narayan Department of Electrical and Computer Engineering and Institute for System Research This dissertation studies the problem of secret key generation for encrypted group communication in a network, based on an information theore...

متن کامل

Information Theoretic Secret Key Generation: Structured codes and Tree Packing

Title of dissertation: INFORMATION THEORETIC SECRET KEY GENERATION: STRUCTURED CODES AND TREE PACKING Sirin Nitinawarat, Doctor of Philosophy, 2010 Dissertation directed by: Professor Prakash Narayan Department of Electrical and Computer Engineering Institute for Systems Research This dissertation deals with a multiterminal source model for secret key generation by multiple network terminals wi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008