Secret Key Generation With Limited Interaction

被引:26
作者
Liu, Jingbo [1 ]
Cuff, Paul [2 ]
Verdu, Sergio [1 ]
机构
[1] Princeton Univ, Dept Elect Engn, Princeton, NJ 08544 USA
[2] Renaissance Technol, East Setauket, NY 11733 USA
基金
美国国家科学基金会;
关键词
Random number generation; communication complexity; interactive communication; convex envelope characterization; maximal correlation; strong data processing; COMMON RANDOMNESS; INFORMATION-THEORY; RANDOM-VARIABLES; AGREEMENT; HYPERCONTRACTIVITY; COMMUNICATION; CAPACITY; DISTRIBUTIONS; CRYPTOGRAPHY; CONTINGENCY;
D O I
10.1109/TIT.2017.2746104
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A basic two-terminal secret key generation model is considered, where the interactive communication rate between the terminals may be limited, and in particular may not be enough to achieve the maximum key rate. We first prove a multi-letter characterization of the key-communication rate region (where the number of auxiliary random variables depends on the number of rounds of the communication), and then provide an equivalent but simpler characterization in terms of concave envelopes in the case of unlimited number of rounds. Two extreme cases are given special attention. First, in the regime of very low communication rates, the key bits per interaction bit (KBIB) is expressed with a new "symmetric strong data processing constant", which has a concave envelope characterization analogous to that of the conventional strong data processing constant. The symmetric strong data processing constant can be upper bounded by the supremum of the maximal correlation coefficient over a set of distributions, which allows us to determine the KBIB for binary symmetric sources, and conclude, in particular, that the interactive scheme is not more efficient than the one-way scheme at least in the low communication-rate regime. Second, a new characterization of the minimum interaction rate needed for achieving the maximum key rate (MIMK) is given, and we resolve a conjecture by Tyagi regarding the MIMK for (possibly nonsymmetric) binary sources. We also propose a new conjecture for binary symmetric sources that the interactive scheme is not more efficient than the one-way scheme at any communication rate.
引用
收藏
页码:7358 / 7381
页数:24
相关论文
共 54 条
[1]   SPREADING OF SETS IN PRODUCT SPACES AND HYPERCONTRACTION OF MARKOV OPERATOR [J].
AHLSWEDE, R ;
GACS, P .
ANNALS OF PROBABILITY, 1976, 4 (06) :925-939
[2]   Common randomness in information theory and cryptography - Part II: CR capacity [J].
Ahlswede, R ;
Csiszar, I .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1998, 44 (01) :225-240
[3]   COMMON RANDOMNESS IN INFORMATION-THEORY AND CRYPTOGRAPHY .1. SECRET SHARING [J].
AHLSWEDE, R ;
CSISZAR, I .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1993, 39 (04) :1121-1132
[4]  
Anantharam V, 2013, ANN ALLERTON CONF, P13, DOI 10.1109/Allerton.2013.6736499
[5]  
[Anonymous], 2011, INFORM THEORY CODING, DOI DOI 10.1017/CBO9780511921889
[6]  
[Anonymous], 2011, Network information theory
[7]  
[Anonymous], 2013, MAXIMAL CORRELATION
[8]  
Boothby W.M., 2003, An introduction to differentiable manifolds and Riemannian geometry, V120
[9]  
Braverman M., 2015, IEEE INF THEORY SOC, V65, P4
[10]   Information Equals Amortized Communication [J].
Braverman, Mark ;
Rao, Anup .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2014, 60 (10) :6058-6069