Secret-key agreement over unauthenticated public channels-part III: privacy amplification
- 15 April 2003
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Transactions on Information Theory
- Vol. 49 (4) , 839-851
- https://doi.org/10.1109/tit.2003.809559
Abstract
For pt. II see ibid., vol.49, no.4, p.832-38 (2003). Here, we consider the special case where the legitimate partners already share a mutual string which might, however, be partially known to the adversary. The problem of generating a secret key in this case has been well studied in the passive-adversary model - for instance, in the context of quantum key agreement - under the name of privacy amplification. We consider the same problem with respect to an active adversary and propose two protocols, one based on universal hashing and one based on extractors, allowing for privacy amplification secure against an adversary whose knowledge about the initial partially secret string is limited to one third of the length of this string. Our results are based on novel techniques for authentication secure even against adversaries knowing a substantial amount of the "secret" key.Keywords
This publication has 19 references indexed in Scilit:
- Secret-key agreement over unauthenticated public channels-part I: definitions and a completeness resultIEEE Transactions on Information Theory, 2003
- Secret-key agreement over unauthenticated public channels-part II: the simulatability conditionIEEE Transactions on Information Theory, 2003
- Authentication theory and hypothesis testingIEEE Transactions on Information Theory, 2000
- Information-Theoretic Key Agreement: From Weak to Strong Secrecy for FreePublished by Springer Nature ,2000
- Extracting all the randomness and reducing the error in Trevisan's extractorsPublished by Association for Computing Machinery (ACM) ,1999
- Unconditionally secure key agreement and the intrinsic conditional informationIEEE Transactions on Information Theory, 1999
- Linking information reconciliation and privacy amplificationJournal of Cryptology, 1997
- Information-Theoretically Secure Secret-Key Agreement by NOT Authenticated Public DiscussionPublished by Springer Nature ,1997
- Randomness is Linear in SpaceJournal of Computer and System Sciences, 1996
- Communication Theory of Secrecy Systems*Bell System Technical Journal, 1949