Secret Key Agreement via Secure Omniscience

被引:0
|
作者
Vippathalla, Praneeth Kumar [1 ,2 ]
Chan, Chung [3 ]
Kashyap, Navin [1 ]
Zhou, Qiaoqiao [4 ]
机构
[1] Indian Inst Sci, Dept Elect Commun Engn, Bengaluru 560012, India
[2] Univ Oxford, Dept Engn Sci, Oxford OX1 3PJ, England
[3] City Univ Hong Kong, Dept Comp Sci, Kowloon Tong, Hong Kong, Peoples R China
[4] Natl Univ Singapore, Dept Comp Sci, Singapore 119077, Singapore
关键词
Information theoretic security; secret key generation; secure omniscience; leakage rate for omniscience; tree-PIN model; finite linear sources; CAPACITIES; BOUNDS;
D O I
10.1109/TIT.2023.3327151
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we explore the connection between secret key agreement and secure omniscience within the setting of the multiterminal source model with an eavesdropper having side information. While the secret key agreement problem considers the generation of a maximum-rate secret key through public discussion, the secure omniscience problem is concerned with communication protocols for omniscience that minimize the rate of information leakage to the eavesdropper. The starting point of our work is a lower bound on the minimum leakage rate for omniscience, R-L, in terms of the wiretap secret key capacity, C-W. Our interest is in identifying broad classes of sources for which this lower bound is met with equality, in which case we say that there is a duality between secure omniscience and secret key agreement. We show that this duality holds in the case of certain finite linear source (FLS) models, such as two-terminal FLS models and pairwise independent network models on trees with a linear eavesdropper. Duality also holds for any FLS model in which C-W is achieved by a perfect linear secret key agreement scheme. We conjecture that the duality in fact holds unconditionally for any FLS model. On the negative side, we give an example of a (non-FLS) source model for which duality does not hold if we limit ourselves to communication-for-omniscience protocols with at most two (interactive) communications. We also address the secure function computation problem and explore the connection between the minimum leakage rate for computing a function and the wiretap secret key capacity.
引用
收藏
页码:8029 / 8053
页数:25
相关论文
共 50 条
  • [31] A secure key agreement protocol for dynamic group
    Muhammad Bilal
    Shin-Gak Kang
    Cluster Computing, 2017, 20 : 2779 - 2792
  • [32] An efficient key agreement protocol for secure authentication
    Kim, YS
    Huh, EN
    Hwang, J
    Lee, BW
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2004, PT 1, 2004, 3043 : 746 - 754
  • [33] Polar Coding for Secure Transmission and Key Agreement
    Koyluoglu, O. Ozan
    El Gamal, Hesham
    2010 IEEE 21ST INTERNATIONAL SYMPOSIUM ON PERSONAL INDOOR AND MOBILE RADIO COMMUNICATIONS (PIMRC), 2010, : 2698 - 2703
  • [34] Polar Coding for Secure Transmission and Key Agreement
    Koyluoglu, O. Ozan
    El Gamal, Hesham
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (05) : 1472 - 1483
  • [35] Enhancement on strongly secure group key agreement
    Tseng, Yuh-Min
    Tsai, Tung-Tso
    Huang, Sen-Shan
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (02) : 126 - 135
  • [36] A secret-key exponential key agreement protocol with smart cards
    Yoon, Eun-Jun
    Yoo, Kee-Young
    AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2007, 4610 : 430 - +
  • [37] Robust authentication and key agreement scheme preserving the privacy of secret key
    Wang, Ren-Chiun
    Juang, Wen-Shenq
    Lei, Chin-Laung
    COMPUTER COMMUNICATIONS, 2011, 34 (03) : 274 - 280
  • [38] Secret Key Generation and Agreement in UWB Communication Channels
    Madiseh, Masoud Ghoreishi
    McGuire, Michael L.
    Neville, Stephen S.
    Cai, Lin
    Horie, Michael
    GLOBECOM 2008 - 2008 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2008,
  • [39] A Channel Model of Transceivers for Multiterminal Secret Key Agreement
    Poostindouz, Alireza
    Safavi-Naini, Reihaneh
    PROCEEDINGS OF 2020 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA2020), 2020, : 412 - 416
  • [40] Secret Key Agreement using a Virtual Wiretap Channel
    Sharifian, Setareh
    Lin, Fuchun
    Safavi-Naini, Reihaneh
    IEEE INFOCOM 2017 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, 2017,