Second-Order Asymptotics for One-way Secret Key Agreement

被引:1
|
作者
Poostindouz, Alireza [1 ]
Safavi-Naini, Reihaneh [1 ]
机构
[1] Univ Calgary, Calgary, AB, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
POLARIZATION; CAPACITY; CODES;
D O I
10.1109/ISIT45174.2021.9518202
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Secret key agreement (SKA) is a basic cryptographic primitive that establishes a shared secret key between parties. In the two-party source model of SKA, Alice and Bob want to share a secret key. They each have private samples of two correlated variables that are partially leaked to Eve. In a one-way SKA protocol, Alice sends a single message to Bob over a public channel, allowing the two parties to calculate a shared secret key that will be essentially unknown to Eve. The length of the key is a function of the number of samples n. In this paper, we prove a tight second-order asymptotic approximation of the key length of one-way SKA protocols, and propose an approach to construct a computationally efficient one-way SKA protocol with near-optimum finite key length. We compare our results with related work, and discuss future research directions.
引用
收藏
页码:1254 / 1259
页数:6
相关论文
共 50 条
  • [1] Secret Key Agreement: General Capacity and Second-Order Asymptotics
    Hayashi, Masahito
    Tyagi, Himanshu
    Watanabe, Shun
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2016, 62 (07) : 3796 - 3810
  • [2] Secret Key Agreement: General Capacity and Second-Order Asymptotics
    Hayashi, Masahito
    Tyagi, Himanshu
    Watanabe, Shun
    2014 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2014, : 1136 - 1140
  • [3] SECOND-ORDER CONSTANCY OF ONE-WAY VELOCITY OF LIGHT
    RUDERFER, M
    PROCEEDINGS OF THE INSTITUTE OF RADIO ENGINEERS, 1962, 50 (11): : 2372 - &
  • [4] Efficient One-Way Secret-Key Agreement and Private Channel Coding via Polarization
    Renes, Joseph M.
    Renner, Renato
    Sutter, David
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2013, PT I, 2013, 8269 : 194 - 213
  • [5] One-way secret-key agreement and applications to circuit polarization and immunization of public-key encryption
    Holenstein, T
    Renner, R
    ADVANCES IN CRYPTOLOGY - CRYPTO 2005, PROCEEDINGS, 2005, 3621 : 478 - 493
  • [6] One-way quantum key distribution:: Simple upper bound on the secret key rate
    Moroder, Tobias
    Curty, Marcos
    Luetkenhaus, Norbert
    PHYSICAL REVIEW A, 2006, 74 (05):
  • [7] Authenticated key agreement without using one-way hash functions
    Harn, L
    Lin, HY
    ELECTRONICS LETTERS, 2001, 37 (10) : 629 - 630
  • [8] Coherent one-way quantum conference key agreement based on twin field
    Cao, Xiao-Yu
    Gu, Jie
    Lu, Yu-Shuo
    Yin, Hua-Lei
    Chen, Zeng-Bing
    NEW JOURNAL OF PHYSICS, 2021, 23 (04):
  • [9] Certificateless One-Way Authenticated Two-Party Key Agreement Protocol
    Chen, Wuping
    Zhang, Lei
    Qin, Bo
    Wu, Qianhong
    Zhang, Huanguo
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 483 - +
  • [10] Communication-Constrained Secret Key Generation: Second-Order Bounds
    Hentila, Henri
    Shkel, Yanina Y.
    Koivunen, Visa
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2024, 70 (11) : 8180 - 8203