Abstract
Consider the following scenario: Alice and Bob, two parties who share no secret key initially but whose goal it is to generate a (large amount of) information-theoretically secure (or unconditionally secure) shared secret key, are connected only by an insecure public channel to which an eavesdropper Eve has perfect (read) access. Moreover, there exists a satelite broadcasting random bits at a very low signal power. Alice and Bob can receive these bits with certain bit error probabilities ∊A and ∊B, respectively (e.g. ∊A = ∊B = 30%) while Eve is assumed to receive the same bits much more reliably with bit error probability ∊E ≪ ∊A, ∊B (e.g. ∊E = 1%). The errors on the three channels are assumed to occur at least partially independently. Practical protocols are discussed by which Alice and Bob can generate a secret key despite the facts that Eve possesses more information than both of them and is assumed to have unlimited computational resources as well as complete knowledge of the protocols. The described scenario is a special case of a much more general setup in which Alice, Bob and Eve are assumed to know random variables X, Y and Z jointly distributed according to some probability distribution PXYZ, respectively. The results of this paper suggest to build cryptographic systems that are provably secure against enemies with unlimited computing power under realistic assumptions about the partial independence of the noise on the involved communication channels.
Cite
CITATION STYLE
Maurer, U. M. (1993). Protocols for secret key agreement by public discussion based on common information. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 740 LNCS, pp. 461–470). Springer Verlag. https://doi.org/10.1007/3-540-48071-4_32
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.