Protocols for secret key agreement by public discussion based on common information

55Citations
Citations of this article
112Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Consider the following scenario: Alice and Bob, two parties who share no secret key initially but whose goal it is to generate a (large amount of) information-theoretically secure (or unconditionally secure) shared secret key, are connected only by an insecure public channel to which an eavesdropper Eve has perfect (read) access. Moreover, there exists a satelite broadcasting random bits at a very low signal power. Alice and Bob can receive these bits with certain bit error probabilities ∊A and ∊B, respectively (e.g. ∊A = ∊B = 30%) while Eve is assumed to receive the same bits much more reliably with bit error probability ∊E ≪ ∊A, ∊B (e.g. ∊E = 1%). The errors on the three channels are assumed to occur at least partially independently. Practical protocols are discussed by which Alice and Bob can generate a secret key despite the facts that Eve possesses more information than both of them and is assumed to have unlimited computational resources as well as complete knowledge of the protocols. The described scenario is a special case of a much more general setup in which Alice, Bob and Eve are assumed to know random variables X, Y and Z jointly distributed according to some probability distribution PXYZ, respectively. The results of this paper suggest to build cryptographic systems that are provably secure against enemies with unlimited computing power under realistic assumptions about the partial independence of the noise on the involved communication channels.

Cite

CITATION STYLE

APA

Maurer, U. M. (1993). Protocols for secret key agreement by public discussion based on common information. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 740 LNCS, pp. 461–470). Springer Verlag. https://doi.org/10.1007/3-540-48071-4_32

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free