DocumentCode :
4448
Title :
Separation of Reliability and Secrecy in Rate-Limited Secret-Key Generation
Author :
Chou, Remi A. ; Bloch, Matthieu R.
Author_Institution :
Sch. of Electr. & Comput. Eng., Georgia Inst. of Technol., Atlanta, GA, USA
Volume :
60
Issue :
8
fYear :
2014
fDate :
Aug. 2014
Firstpage :
4941
Lastpage :
4957
Abstract :
For a discrete or a continuous source model, we study the problem of secret-key generation with one round of rate-limited public communication between two legitimate users. Although we do not provide new bounds on the wiretap secret-key (WSK) capacity for the discrete source model, we use an alternative achievability scheme that may be useful for practical applications. As a side result, we conveniently extend known bounds to the case of a continuous source model. Specifically, we consider a sequential key-generation strategy, that implements a rate-limited reconciliation step to handle reliability, followed by a privacy amplification step performed with extractors to handle secrecy. We prove that such a sequential strategy achieves the best known bounds for the rate-limited WSK capacity (under the assumption of degraded sources in the case of two-way communication). However, we show that, unlike the case of rate-unlimited public communication, achieving the reconciliation capacity in a sequential strategy does not necessarily lead to achieving the best known bounds for the WSK capacity. Consequently, reliability and secrecy can be treated successively but not independently, thereby exhibiting a limitation of sequential strategies for rate-limited public communication. Nevertheless, we provide scenarios for which reliability and secrecy can be treated successively and independently, such as the two-way rate-limited SK capacity, the one-way rate-limited WSK capacity for degraded binary symmetric sources, and the one-way rate-limited WSK capacity for Gaussian degraded sources.
Keywords :
Gaussian distribution; data privacy; private key cryptography; reliability; Gaussian degraded sources; continuous source model; degraded binary symmetric sources; discrete source model; legitimate users; privacy amplification; rate-limited WSK capacity; rate-limited public communication; rate-limited reconciliation; rate-limited secret-key generation; reconciliation capacity; reliability separation; secrecy separation; sequential key-generation; sequential strategy; two-way communication; wiretap secret-key capacity; Channel capacity; Encoding; Privacy; Protocols; Reliability theory; Security; Secret-key capacity; privacy amplification; rate-limited communication; reconciliation; secret-key generation;
fLanguage :
English
Journal_Title :
Information Theory, IEEE Transactions on
Publisher :
ieee
ISSN :
0018-9448
Type :
jour
DOI :
10.1109/TIT.2014.2323246
Filename :
6814952
Link To Document :
بازگشت