DocumentCode :
3356230
Title :
Formalization of information-theoretic security for key agreement, revisited
Author :
Shikata, Junji
Author_Institution :
Grad. Sch. of Environ. & Inf. Sci., Yokohama Nat. Univ., Yokohama, Japan
fYear :
2013
fDate :
7-12 July 2013
Firstpage :
2720
Lastpage :
2724
Abstract :
In this paper, we investigate relationships between the following formalizations of information-theoretic security for key agreement protocols which may have agreement-errors: formalizations extended (or relaxed) from Shannon´s perfect secrecy by using mutual information and statistical distance; and the ones of composable security by Maurer et al. and Canetti. Then, we explicitly show that those are essentially equivalent. We also derive lower bounds on the adversary´s (or distinguisher´s) advantage and the size of a correlated randomness resource required under all of the above formalizations at once through our relationships. In addition, we observe impossibility results which easily follow from the lower bounds.
Keywords :
coding errors; information theory; agreement-errors; formalization; information-theoretic security; lower bounds; Decision support systems; Information theory;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Theory Proceedings (ISIT), 2013 IEEE International Symposium on
Conference_Location :
Istanbul
ISSN :
2157-8095
Type :
conf
DOI :
10.1109/ISIT.2013.6620721
Filename :
6620721
Link To Document :
بازگشت