Secret Key Agreement via Secure Omniscience

被引:0
|
作者
Vippathalla, Praneeth Kumar [1 ,2 ]
Chan, Chung [3 ]
Kashyap, Navin [1 ]
Zhou, Qiaoqiao [4 ]
机构
[1] Indian Inst Sci, Dept Elect Commun Engn, Bengaluru 560012, India
[2] Univ Oxford, Dept Engn Sci, Oxford OX1 3PJ, England
[3] City Univ Hong Kong, Dept Comp Sci, Kowloon Tong, Hong Kong, Peoples R China
[4] Natl Univ Singapore, Dept Comp Sci, Singapore 119077, Singapore
关键词
Information theoretic security; secret key generation; secure omniscience; leakage rate for omniscience; tree-PIN model; finite linear sources; CAPACITIES; BOUNDS;
D O I
10.1109/TIT.2023.3327151
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we explore the connection between secret key agreement and secure omniscience within the setting of the multiterminal source model with an eavesdropper having side information. While the secret key agreement problem considers the generation of a maximum-rate secret key through public discussion, the secure omniscience problem is concerned with communication protocols for omniscience that minimize the rate of information leakage to the eavesdropper. The starting point of our work is a lower bound on the minimum leakage rate for omniscience, R-L, in terms of the wiretap secret key capacity, C-W. Our interest is in identifying broad classes of sources for which this lower bound is met with equality, in which case we say that there is a duality between secure omniscience and secret key agreement. We show that this duality holds in the case of certain finite linear source (FLS) models, such as two-terminal FLS models and pairwise independent network models on trees with a linear eavesdropper. Duality also holds for any FLS model in which C-W is achieved by a perfect linear secret key agreement scheme. We conjecture that the duality in fact holds unconditionally for any FLS model. On the negative side, we give an example of a (non-FLS) source model for which duality does not hold if we limit ourselves to communication-for-omniscience protocols with at most two (interactive) communications. We also address the secure function computation problem and explore the connection between the minimum leakage rate for computing a function and the wiretap secret key capacity.
引用
收藏
页码:8029 / 8053
页数:25
相关论文
共 50 条
  • [41] Secret Key Agreement for Data Dissemination in Vehicular Platoons
    Li, Kai
    Lu, Lingyun
    Ni, Wei
    Tovar, Eduardo
    Guizani, Mohsen
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2019, 68 (09) : 9060 - 9073
  • [42] Universal Multiparty Data Exchange and Secret Key Agreement
    Tyagi, Himanshu
    Watanabe, Shun
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2017, 63 (07) : 4057 - 4074
  • [43] Secure Information Exchange for Omniscience
    Chan, Chung
    Kashyap, Navin
    Vippathalla, Praneeth Kumar
    Zhou, Qiaoqiao
    2020 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2020, : 966 - 971
  • [44] SECRET KEY AGREEMENT: FUNDAMENTAL LIMITS AND PRACTICAL CHALLENGES
    Rezki, Zouheir
    Zorgui, Marwen
    Alomair, Basel
    Alouini, Mohamed-Slim
    IEEE WIRELESS COMMUNICATIONS, 2017, 24 (03) : 72 - 79
  • [45] AN APPLICATION OF ST-NUMBERING TO SECRET KEY AGREEMENT
    Mizuki, Takaaki
    Nakayama, Satoru
    Sone, Hideaki
    INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2011, 22 (05) : 1211 - 1227
  • [46] Secret Key Agreement under Discussion Rate Constraints
    Chan, Chung
    Mukherjee, Manuj
    Kashyap, Navin
    Zhou, Qiaoqiao
    2017 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2017, : 1519 - 1523
  • [47] Communication for omniscience by a neutral observer and information-theoretic key agreement of multiple terminals
    Gohari, Amin Aminzadeh
    Anantharam, Venkat
    2007 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS, VOLS 1-7, 2007, : 2056 - 2060
  • [48] Channel-Aware Secure Communication via Hybrid Wiretap Encoding and Secret Key Generation
    Xu, Qian
    Ren, Pinyi
    Du, Qinghe
    Wang, Dawei
    2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2018,
  • [49] A Secure Image Watermarking Framework with Statistical Guarantees via Adversarial Attacks on Secret Key Networks
    Chen, Feiyu
    Lin, Wei
    Liu, Ziquan
    Chan, Antoni B.
    COMPUTER VISION - ECCV 2024, PT XL, 2025, 15098 : 428 - 445
  • [50] Secret Key-Awareness Secure in Certificateless Cryptography
    Zhang, Guoyan
    2011 3RD INTERNATIONAL CONFERENCE ON ENVIRONMENTAL SCIENCE AND INFORMATION APPLICATION TECHNOLOGY ESIAT 2011, VOL 10, PT A, 2011, 10 : 633 - 639