Spectral Approach to the Communication Complexity of Multi-Party Key Agreement

被引:0
作者
Caillat-Grenier, Geoffroy [1 ]
Romashchenko, Andrei [1 ]
机构
[1] Univ Montpellier, CNRS, LIRMM, Montpellier, France
来源
41ST INTERNATIONAL SYMPOSIUM ON THEORETICAL ASPECTS OF COMPUTER SCIENCE, STACS 2024 | 2024年 / 289卷
关键词
communication complexity; Kolmogorov complexity; information-theoretic cryptography; multiparty secret key agreement; expander mixing lemma; information inequalities; SECRET KEY; COMMON RANDOMNESS;
D O I
10.4230/LIPIcs.STACS.2024.22
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We propose a linear algebraic method, rooted in the spectral properties of graphs, that can be used to prove lower bounds in communication complexity. Our proof technique effectively marries spectral bounds with information-theoretic inequalities. The key insight is the observation that, in specific settings, even when data sets X and Y are closely correlated and have high mutual information, the owner of X cannot convey a reasonably short message that maintains substantial mutual information with Y. In essence, from the perspective of the owner of Y, any sufficiently brief message m = m(X) would appear nearly indistinguishable from a random bit sequence. We employ this argument in several problems of communication complexity. Our main result concerns cryptographic protocols. We establish a lower bound for communication complexity of multiparty secret key agreement with unconditional, i.e., information-theoretic security. Specifically, for one-round protocols (simultaneous messages model) of secret key agreement with three participants we obtain an asymptotically tight lower bound. This bound implies optimality of the previously known omniscience communication protocol (this result applies to a non-interactive secret key agreement with three parties and input data sets with an arbitrary symmetric information profile). We consider communication problems in one-shot scenarios when the parties inputs are not produced by any i.i.d. sources, and there are no ergodicity assumptions on the input data. In this setting, we found it natural to present our results using the framework of Kolmogorov complexity.
引用
收藏
页数:19
相关论文
共 29 条
[1]   COMMON RANDOMNESS IN INFORMATION-THEORY AND CRYPTOGRAPHY .1. SECRET SHARING [J].
AHLSWEDE, R ;
CSISZAR, I .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1993, 39 (04) :1121-1132
[2]  
Antunes L., 2007, INT C INF THEOR SEC, P195
[3]  
Babai L., 1986, 27th Annual Symposium on Foundations of Computer Science (Cat. No.86CH2354-9), P337, DOI 10.1109/SFCS.1986.15
[4]  
Bafna M, 2019, Disc Algorithms, P1861
[5]  
Bennett C. H., 1992, Journal of Cryptology, V5, P3, DOI 10.1007/BF00191318
[6]   An Overview of Information-Theoretic Security and Privacy: Metrics, Limits and Applications [J].
Bloch, Matthieu ;
Guenlue, Onur ;
Yener, Aylin ;
Oggier, Frederique ;
Poor, H. Vincent ;
Sankar, Lalitha ;
Schaefer, Rafael F. .
IEEE JOURNAL ON SELECTED AREAS IN INFORMATION THEORY, 2021, 2 (01) :5-22
[7]   Secrecy capacities for multiple terminals [J].
Csiszár, I ;
Narayan, P .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2004, 50 (12) :3047-3061
[8]   Distillation of secret key and entanglement from quantum states [J].
Devetak, I ;
Winter, A .
PROCEEDINGS OF THE ROYAL SOCIETY A-MATHEMATICAL PHYSICAL AND ENGINEERING SCIENCES, 2005, 461 (2053) :207-235
[9]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[10]  
Ding YZ, 2005, LECT NOTES COMPUT SC, V3378, P578