Tight exponential evaluation for information theoretical secrecy based on L1 distance
نویسنده
چکیده
We adopt L1 distance as Eve’s distinguishability in secret key generation from a common random number without communication. Under this secrecy criterion, using the Rényi entropy of order 1 + s for s ∈ [0, 1], we derive a new upper bound of Eve’s distinguishability under the application of the universal2 hash function. It is also shown that this bound gives the tight exponential decreasing rate. The result is applied to wire-tap channel model and secret key distillation (agreement) by public discussion.
منابع مشابه
On The Secrecy of the Cognitive Interference Channel with Channel State
In this paper the secrecy problem in the cognitive state-dependent interference channel is considered. In this scenario we have a primary and a cognitive transmitter-receiver pairs. The cognitive transmitter has the message of the primary sender as side information. In addition, the state of the channel is known at the cognitive encoder. Hence, the cognitive encoder uses this side information t...
متن کاملStatistical Secrecy and Multibit Commitments
We present and compare definitions of the notion of “statistically hiding” protocols, and we propose a novel statistically hiding commitment scheme. Informally, a protocol statistically hides a secret if a computationally unlimited adversary who conducts the protocol with the owner of the secret learns almost nothing about it. One definition is based on the L1-norm distance between probability ...
متن کاملA joint Shannon cipher and privacy amplification approach to attaining exponentially decaying information leakage
In this paper, we propose a novel layering approach to achieve end-to-end exponential security without resorting to presumed physical layer conditions. The only requirement for such an exponentially secure system is existence of a common key source between legitimate users that is partially known by Eve. The novel framework includes a random cipher and key stream generating scheme constituting ...
متن کاملImpacts of the Negative-exponential and the K-distribution modeled FSO turbulent links on the theoretical and simulated performance of the distributed diffusion networks
Merging the adaptive networks with the free space optical (FSO) communication technology is a very interesting field of research because by adding the benefits of this technology, the adaptive networks become more efficient, cheap and secure. This is due to the fact that FSO communication uses unregistered visible light bandwidth instead of the overused radio spectrum. However, in spite of all ...
متن کاملInterval Estimation for the Exponential Distribution under Progressive Type-II Censored Step-Stress Accelerated Life-Testing Model Based on Fisher Information
This paper, determines the confidence interval using the Fisher information under progressive type-II censoring for the k-step exponential step-stress accelerated life testing. We study the performance of these confidence intervals. Finally an example is given to illustrate the proposed procedures.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1010.1358 شماره
صفحات -
تاریخ انتشار 2010