Title :
Secret-key agreement over unauthenticated public channels .I. Definitions and a completeness result
Author :
Maurer, Ueli ; Wolf, Stefan
Author_Institution :
Dept. of Comput. Sci., Swiss Fed. Inst. of Technol., Zurich, Switzerland
fDate :
4/1/2003 12:00:00 AM
Abstract :
This is the first part of a three-part paper on secret-key agreement secure against active adversaries. In all three parts, we address the question whether two parties, knowing some correlated pieces of information X and Y, respectively, can generate a string S about which an adversary, knowing some information Z and having read and write access to the communication channel used by the legitimate partners, is almost completely ignorant. Whether such key agreement is possible, and if yes at which rate, is an inherent property of the joint probability distribution PXYZ. In this part, we first prove a number of general impossibility results. We then consider the important special case where the legitimate partners as well as the adversary have access to the outcomes of many independent repetitions of a fixed tripartite random experiment. In this case, the result characterizing the possibility of secret-key agreement secure against active adversaries is of all-or-nothing nature: either a secret key can be generated at the same rate as in the (well-studied) passive-adversary case, or such secret-key agreement is completely impossible. The exact condition characterizing the two cases is presented.
Keywords :
correlation methods; cryptography; message authentication; probability; random processes; telecommunication channels; active adversaries; authentication; communication channel; completeness result; correlated information; cryptography; fixed tripartite random experiment; general impossibility results; independent repetitions; joint probability distribution; legitimate partners; passive-adversary; read access; secret-key agreement; string; unauthenticated public channels; write access; Character generation; Communication channels; Computational modeling; Computer science; Joining processes; Probability distribution; Public key cryptography; Quantum computing; Random variables; Security;
Journal_Title :
Information Theory, IEEE Transactions on
DOI :
10.1109/TIT.2003.809563