The Strong Secret Key Rate ofDiscrete Random
نویسنده
چکیده
Three parties, Alice, Bob and Eve, know the sequences of ran-generated by a discrete memoryless source according to some probability distribution P XY Z. Motivated by Wyner's and Csiszz ar and KK orner's pioneering definition of, and work on, the secrecy capacity of a broadcast channel, the secret key rate of P XY Z was deened by Maurer as the maximal rate M=N at which Alice and Bob can generate secret shared random key bits S 1 ; : : : ; S M by exchanging messages over an insecure public channel accessible to Eve, such that the rate at which Eve obtains information about the key is arbitrarily small,)=N = 0, where C t is the collection of messages exchanged between Alice and Bob over the public channel. However , this deenition is not completely satisfactory because only the rate, but not the total amount of information about the key obtained by Eve is bounded. This paper introduces and investigates the strong secret key rate: it is required that the total amount of information about the key obtained by Eve be negligible, i. Using novel results on privacy ampliication by Bennett, Brassard, Cr epeau and Maurer we demonstrate that the known results for the secret key rate also hold for the stronger deenition.
منابع مشابه
The Strong Secret Key Rate
Three parties, Alice, Bob and Eve, know the sequences of ran-generated by a discrete memoryless source according to some probability distribution P XY Z. Motivated by Wyner's and Csiszz ar and KK orner's pioneering definition of, and work on, the secrecy capacity of a broadcast channel, the secret key rate of P XY Z was deened by Maurer as the maximal rate M=N at which Alice and Bob can generat...
متن کاملOptimal SVD-based Precoding for Secret Key Extraction from Correlated OFDM Sub-Channels
Secret key extraction is a crucial issue in physical layer security and a less complex and, at the same time, a more robust scheme for the next generation of 5G and beyond. Unlike previous works on this topic, in which Orthogonal Frequency Division Multiplexing (OFDM) sub-channels were considered to be independent, the effect of correlation between sub-channels on the secret key rate is address...
متن کاملImproving the Rao-Nam secret key cryptosystem using regular EDF-QC-LDPC codes
This paper proposes an efficient joint secret key encryption-channel coding cryptosystem, based on regular Extended Difference Family Quasi-Cyclic Low-Density Parity-Check codes. The key length of the proposed cryptosystem decreases up to 85 percent using a new efficient compression algorithm. Cryptanalytic methods show that the improved cryptosystem has a significant security advantage over Ra...
متن کاملRandom Matrices Based Image Secret Sharing
This paper presents an image secret sharing method based on some random matrices that acts as a key for secret sharing. The technique allows a secret image to be divided into four image shares with each share individually looks meaningless. To reconstruct the secret image all four shares have to be used. Any subset m (1< m ≤ 4) shares cannot get sufficient information to reveal th e secret imag...
متن کاملA Strong Identity Based Key-Insulated Cryptosystem
Key-insulated cryptosystem was proposed in order to minimize the damage of secret key exposure. In this paper, we propose a strong identity based (ID-based) key-insulated cryptosystem security model, including ID-based key-insulated encryption (IB-KIE) security model and ID-based key-insulated signature (IB-KIS) security model. Based on the security models, provably secure strong IB-KIE and IBK...
متن کامل