Tight exponential evaluation for information theoretical secrecy based on L1 distance

نویسنده

  • Masahito Hayashi
چکیده

We adopt L1 distance as Eve’s distinguishability in secret key generation from a common random number without communication. Under this secrecy criterion, using the Rényi entropy of order 1 + s for s ∈ [0, 1], we derive a new upper bound of Eve’s distinguishability under the application of the universal2 hash function. It is also shown that this bound gives the tight exponential decreasing rate. The result is applied to wire-tap channel model and secret key distillation (agreement) by public discussion.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On The Secrecy of the Cognitive Interference Channel with Channel State

In this paper the secrecy problem in the cognitive state-dependent interference channel is considered. In this scenario we have a primary and a cognitive transmitter-receiver pairs. The cognitive transmitter has the message of the primary sender as side information. In addition, the state of the channel is known at the cognitive encoder. Hence, the cognitive encoder uses this side information t...

متن کامل

Statistical Secrecy and Multibit Commitments

We present and compare definitions of the notion of “statistically hiding” protocols, and we propose a novel statistically hiding commitment scheme. Informally, a protocol statistically hides a secret if a computationally unlimited adversary who conducts the protocol with the owner of the secret learns almost nothing about it. One definition is based on the L1-norm distance between probability ...

متن کامل

A joint Shannon cipher and privacy amplification approach to attaining exponentially decaying information leakage

In this paper, we propose a novel layering approach to achieve end-to-end exponential security without resorting to presumed physical layer conditions. The only requirement for such an exponentially secure system is existence of a common key source between legitimate users that is partially known by Eve. The novel framework includes a random cipher and key stream generating scheme constituting ...

متن کامل

Impacts of the Negative-exponential and the K-distribution modeled FSO turbulent links on the theoretical and simulated performance of the distributed diffusion networks

Merging the adaptive networks with the free space optical (FSO) communication technology is a very interesting field of research because by adding the benefits of this technology, the adaptive networks become more efficient, cheap and secure. This is due to the fact that FSO communication uses unregistered visible light bandwidth instead of the overused radio spectrum. However, in spite of all ...

متن کامل

Interval Estimation for the Exponential Distribution under Progressive Type-II Censored Step-Stress Accelerated Life-Testing Model Based on Fisher Information

This paper, determines the confidence interval using the Fisher information under progressive type-II censoring for the k-step exponential step-stress accelerated life testing. We study the performance of these confidence intervals. Finally an example is given to illustrate the proposed procedures.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1010.1358  شماره 

صفحات  -

تاریخ انتشار 2010