DocumentCode :
1180833
Title :
Secret-key agreement over unauthenticated public channels-Part II: the simulatability condition
Author :
Maurer, Ueli ; Wolf, Stefan
Author_Institution :
Dept. of Comput. Sci., Swiss Fed. Inst. of Technol., Zurich, Switzerland
Volume :
49
Issue :
4
fYear :
2003
fDate :
4/1/2003 12:00:00 AM
Firstpage :
832
Lastpage :
838
Abstract :
For pt.I see ibid., vol.49, no.4, p.822-31(2003). In the first part, we showed that when two parties, willing to generate a secret key, but connected only by a completely insecure communication channel, have access to independent repetitions of some random experiment, then the possibility of secret-key agreement depends on a certain property, called simulatability, of the probability distribution modeling the parties´ initial knowledge. More generally, the simulatability condition is important in the context of identification and authentication among parties sharing some correlated but not necessarily identical partially secret keys. Unfortunately, this condition is a priori not very useful since it is not clear how to decide efficiently whether it is satisfied or not for a given distribution PXYZ. We introduce a new formalism, based on a mechanical model for representing the involved quantities, that allows for dealing with discrete joint distributions of random variables and their manipulations by noisy channels. We show that this representation leads to a simple and efficient characterization of the possibility of secret-key agreement secure against active adversaries.
Keywords :
correlation methods; cryptography; message authentication; noise; probability; random processes; telecommunication channels; active adversaries; authentication; correlated secret keys; cryptography; discrete joint distributions; identification; insecure communication channel; noisy channels; probability distribution modeling; random experiment; random variables; secret-key agreement; simulatability condition; unconditional security; Authentication; Calculus; Communication channels; Context modeling; Cryptography; Entropy; Information security; Information theory; Probability distribution; Random variables;
fLanguage :
English
Journal_Title :
Information Theory, IEEE Transactions on
Publisher :
ieee
ISSN :
0018-9448
Type :
jour
DOI :
10.1109/TIT.2003.809560
Filename :
1193794
Link To Document :
بازگشت