Secret Key Agreement via Secure Omniscience

被引:0
|
作者
Vippathalla, Praneeth Kumar [1 ,2 ]
Chan, Chung [3 ]
Kashyap, Navin [1 ]
Zhou, Qiaoqiao [4 ]
机构
[1] Indian Inst Sci, Dept Elect Commun Engn, Bengaluru 560012, India
[2] Univ Oxford, Dept Engn Sci, Oxford OX1 3PJ, England
[3] City Univ Hong Kong, Dept Comp Sci, Kowloon Tong, Hong Kong, Peoples R China
[4] Natl Univ Singapore, Dept Comp Sci, Singapore 119077, Singapore
关键词
Information theoretic security; secret key generation; secure omniscience; leakage rate for omniscience; tree-PIN model; finite linear sources; CAPACITIES; BOUNDS;
D O I
10.1109/TIT.2023.3327151
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we explore the connection between secret key agreement and secure omniscience within the setting of the multiterminal source model with an eavesdropper having side information. While the secret key agreement problem considers the generation of a maximum-rate secret key through public discussion, the secure omniscience problem is concerned with communication protocols for omniscience that minimize the rate of information leakage to the eavesdropper. The starting point of our work is a lower bound on the minimum leakage rate for omniscience, R-L, in terms of the wiretap secret key capacity, C-W. Our interest is in identifying broad classes of sources for which this lower bound is met with equality, in which case we say that there is a duality between secure omniscience and secret key agreement. We show that this duality holds in the case of certain finite linear source (FLS) models, such as two-terminal FLS models and pairwise independent network models on trees with a linear eavesdropper. Duality also holds for any FLS model in which C-W is achieved by a perfect linear secret key agreement scheme. We conjecture that the duality in fact holds unconditionally for any FLS model. On the negative side, we give an example of a (non-FLS) source model for which duality does not hold if we limit ourselves to communication-for-omniscience protocols with at most two (interactive) communications. We also address the secure function computation problem and explore the connection between the minimum leakage rate for computing a function and the wiretap secret key capacity.
引用
收藏
页码:8029 / 8053
页数:25
相关论文
共 50 条
  • [1] On the Optimality of Secret Key Agreement via Omniscience
    Chan, Chung
    Mukherjee, Manuj
    Kashyap, Navin
    Zhou, Qiaoqiao
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2018, 64 (04) : 2371 - 2389
  • [2] Secret Key Agreement and Secure Omniscience of Tree-PIN Source with Linear Wiretapper
    Vippathalla, Praneeth Kumar
    Chan, Chung
    Kashyap, Navin
    Zhou, Qiaoqiao
    2021 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2021, : 1624 - 1629
  • [3] Converses For Secret Key Agreement and Secure Computing
    Tyagi, Himanshu
    Watanabe, Shun
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2015, 61 (09) : 4809 - 4827
  • [4] Secret Key Agreement Based on Secure Polar Code
    Zhang Shengjun
    Zhong Zhou
    Jin Liang
    Huang Kaizhi
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2019, 41 (06) : 1413 - 1419
  • [5] A Bound for Multiparty Secret Key Agreement and Implications for a Problem of Secure Computing
    Tyagi, Himanshu
    Watanabe, Shun
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2014, 2014, 8441 : 369 - 386
  • [6] Multiterminal Secret Key Agreement
    Chan, Chung
    Zheng, Lizhong
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2014, 60 (06) : 3379 - 3412
  • [7] Agreement of a Restricted Secret Key
    Chan, Chung
    2012 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS (ISIT), 2012,
  • [8] A Secure Secret Key Agreement Scheme among Multiple Twinning Superlattice PUF Holders
    Liu, Jing
    Xie, Jianguo
    Zhang, Junwei
    Liu, Biao
    Chen, Xiaoming
    Feng, Huamin
    SENSORS, 2023, 23 (10)
  • [9] On τ-time secure key agreement
    Jiang ShaoQuan
    SCIENCE CHINA-INFORMATION SCIENCES, 2015, 58 (01) : 1 - 13
  • [10] On τ-time secure key agreement
    ShaoQuan Jiang
    Science China Information Sciences, 2015, 58 : 1 - 13