Secret-key agreement over unauthenticated public channels-part I: definitions and a completeness result
- 15 April 2003
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Transactions on Information Theory
- Vol. 49 (4) , 822-831
- https://doi.org/10.1109/tit.2003.809563
Abstract
This is the first part of a three-part paper on secret-key agreement secure against active adversaries. In all three parts, we address the question whether two parties, knowing some correlated pieces of information X and Y, respectively, can generate a string S about which an adversary, knowing some information Z and having read and write access to the communication channel used by the legitimate partners, is almost completely ignorant. Whether such key agreement is possible, and if yes at which rate, is an inherent property of the joint probability distribution P/sub XYZ/. In this part, we first prove a number of general impossibility results. We then consider the important special case where the legitimate partners as well as the adversary have access to the outcomes of many independent repetitions of a fixed tripartite random experiment. In this case, the result characterizing the possibility of secret-key agreement secure against active adversaries is of all-or-nothing nature: either a secret key can be generated at the same rate as in the (well-studied) passive-adversary case, or such secret-key agreement is completely impossible. The exact condition characterizing the two cases is presented.Keywords
This publication has 18 references indexed in Scilit:
- Secret-key agreement over unauthenticated public channels-part II: the simulatability conditionIEEE Transactions on Information Theory, 2003
- Secret-key agreement over unauthenticated public channels-part III: privacy amplificationIEEE Transactions on Information Theory, 2003
- Linking Classical and Quantum Key Agreement: Is There a Classical Analog to Bound Entanglement?Algorithmica, 2002
- Information-Theoretic Key Agreement: From Weak to Strong Secrecy for FreePublished by Springer Nature ,2000
- Unconditionally secure key agreement and the intrinsic conditional informationIEEE Transactions on Information Theory, 1999
- Information-Theoretically Secure Secret-Key Agreement by NOT Authenticated Public DiscussionPublished by Springer Nature ,1997
- Towards characterizing when information-theoretic secret key agreement is possiblePublished by Springer Nature ,1996
- Secret key agreement by public discussion from common informationIEEE Transactions on Information Theory, 1993
- Privacy Amplification by Public DiscussionSIAM Journal on Computing, 1988
- Communication Theory of Secrecy Systems*Bell System Technical Journal, 1949