Secret Key Agreement via Secure Omniscience

被引:0
|
作者
Vippathalla, Praneeth Kumar [1 ,2 ]
Chan, Chung [3 ]
Kashyap, Navin [1 ]
Zhou, Qiaoqiao [4 ]
机构
[1] Indian Inst Sci, Dept Elect Commun Engn, Bengaluru 560012, India
[2] Univ Oxford, Dept Engn Sci, Oxford OX1 3PJ, England
[3] City Univ Hong Kong, Dept Comp Sci, Kowloon Tong, Hong Kong, Peoples R China
[4] Natl Univ Singapore, Dept Comp Sci, Singapore 119077, Singapore
关键词
Information theoretic security; secret key generation; secure omniscience; leakage rate for omniscience; tree-PIN model; finite linear sources; CAPACITIES; BOUNDS;
D O I
10.1109/TIT.2023.3327151
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we explore the connection between secret key agreement and secure omniscience within the setting of the multiterminal source model with an eavesdropper having side information. While the secret key agreement problem considers the generation of a maximum-rate secret key through public discussion, the secure omniscience problem is concerned with communication protocols for omniscience that minimize the rate of information leakage to the eavesdropper. The starting point of our work is a lower bound on the minimum leakage rate for omniscience, R-L, in terms of the wiretap secret key capacity, C-W. Our interest is in identifying broad classes of sources for which this lower bound is met with equality, in which case we say that there is a duality between secure omniscience and secret key agreement. We show that this duality holds in the case of certain finite linear source (FLS) models, such as two-terminal FLS models and pairwise independent network models on trees with a linear eavesdropper. Duality also holds for any FLS model in which C-W is achieved by a perfect linear secret key agreement scheme. We conjecture that the duality in fact holds unconditionally for any FLS model. On the negative side, we give an example of a (non-FLS) source model for which duality does not hold if we limit ourselves to communication-for-omniscience protocols with at most two (interactive) communications. We also address the secure function computation problem and explore the connection between the minimum leakage rate for computing a function and the wiretap secret key capacity.
引用
收藏
页码:8029 / 8053
页数:25
相关论文
共 50 条
  • [21] A Secure Multicast Key Agreement Scheme
    Chen, Hsing-Chung
    Chen, Chung-Wei
    INFORMATION AND COMMUNICATION TECHNOLOGY, 2015, 9357 : 275 - 281
  • [22] Multiparty key agreement for secure teleconferencing
    Chu-Hsing Lin
    H. Siu-Hsia Lin
    Jen-Chleh Chang
    2006 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS, VOLS 1-6, PROCEEDINGS, 2006, : 3702 - +
  • [23] Secret key agreement for satellite laser communications
    Endo, Hiroyuki
    Sasaki, Masahide
    ADVANCES IN COMMUNICATIONS SATELLITE SYSTEMS 2, 2020, 95 : 657 - 667
  • [24] Conference key agreement from secret sharing
    Li, CH
    Pieprzyk, J
    INFORMATION SECURITY AND PRIVACY, 1999, 1587 : 64 - 76
  • [25] Secret key agreement under sampling attack
    Muramatsu, J
    Yoshimura, K
    Arai, K
    Davis, P
    2005 IEEE International Symposium on Information Theory (ISIT), Vols 1 and 2, 2005, : 2147 - 2151
  • [26] Free space optical secret key agreement
    Endo, Hiroyuki
    Fujiwara, Mikio
    Kitamura, Mitsuo
    Tsuzuki, Orie
    Ito, Toshiyuki
    Shimizu, Ryosuke
    Takeoka, Masahiro
    Sasaki, Masahide
    OPTICS EXPRESS, 2018, 26 (18): : 23305 - 23332
  • [27] When is Omniscience a Rate-Optimal Strategy for Achieving Secret Key Capacity?
    Chan, Chung
    Mukherjee, Manuj
    Kashyap, Navin
    Zhou, Qiaoqiao
    2016 IEEE INFORMATION THEORY WORKSHOP (ITW), 2016,
  • [28] Secret Key Optimization for Secure Speech Communications
    Faragallah, Osama S.
    Farouk, Mahmoud
    El-Sayed, Hala S.
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 72 (02): : 3025 - 3037
  • [29] Secure Key Agreement using Pure Biometrics
    Akdogan, Dilara
    Altop, Duygu Karaoglan
    Levi, Albert
    2015 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2015, : 191 - 199
  • [30] A secure key agreement protocol for dynamic group
    Bilal, Muhammad
    Kang, Shin-Gak
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2017, 20 (03): : 2779 - 2792