Secret-key agreement over unauthenticated public channels-part II: the simulatability condition
- 15 April 2003
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Transactions on Information Theory
- Vol. 49 (4) , 832-838
- https://doi.org/10.1109/tit.2003.809560
Abstract
For pt.I see ibid., vol.49, no.4, p.822-31(2003). In the first part, we showed that when two parties, willing to generate a secret key, but connected only by a completely insecure communication channel, have access to independent repetitions of some random experiment, then the possibility of secret-key agreement depends on a certain property, called simulatability, of the probability distribution modeling the parties' initial knowledge. More generally, the simulatability condition is important in the context of identification and authentication among parties sharing some correlated but not necessarily identical partially secret keys. Unfortunately, this condition is a priori not very useful since it is not clear how to decide efficiently whether it is satisfied or not for a given distribution P/sub XYZ/. We introduce a new formalism, based on a mechanical model for representing the involved quantities, that allows for dealing with discrete joint distributions of random variables and their manipulations by noisy channels. We show that this representation leads to a simple and efficient characterization of the possibility of secret-key agreement secure against active adversaries.Keywords
This publication has 9 references indexed in Scilit:
- Secret-key agreement over unauthenticated public channels-part I: definitions and a completeness resultIEEE Transactions on Information Theory, 2003
- Secret-key agreement over unauthenticated public channels-part III: privacy amplificationIEEE Transactions on Information Theory, 2003
- Linking Classical and Quantum Key Agreement: Is There a Classical Analog to Bound Entanglement?Algorithmica, 2002
- Unconditionally secure key agreement and the intrinsic conditional informationIEEE Transactions on Information Theory, 1999
- Information-Theoretically Secure Secret-Key Agreement by NOT Authenticated Public DiscussionPublished by Springer Nature ,1997
- Towards characterizing when information-theoretic secret key agreement is possiblePublished by Springer Nature ,1996
- Common randomness in information theory and cryptography. I. Secret sharingIEEE Transactions on Information Theory, 1993
- Secret key agreement by public discussion from common informationIEEE Transactions on Information Theory, 1993
- The Wire-Tap ChannelBell System Technical Journal, 1975