Second-Order Asymptotics for One-way Secret Key Agreement

被引:1
|
作者
Poostindouz, Alireza [1 ]
Safavi-Naini, Reihaneh [1 ]
机构
[1] Univ Calgary, Calgary, AB, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
POLARIZATION; CAPACITY; CODES;
D O I
10.1109/ISIT45174.2021.9518202
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Secret key agreement (SKA) is a basic cryptographic primitive that establishes a shared secret key between parties. In the two-party source model of SKA, Alice and Bob want to share a secret key. They each have private samples of two correlated variables that are partially leaked to Eve. In a one-way SKA protocol, Alice sends a single message to Bob over a public channel, allowing the two parties to calculate a shared secret key that will be essentially unknown to Eve. The length of the key is a function of the number of samples n. In this paper, we prove a tight second-order asymptotic approximation of the key length of one-way SKA protocols, and propose an approach to construct a computationally efficient one-way SKA protocol with near-optimum finite key length. We compare our results with related work, and discuss future research directions.
引用
收藏
页码:1254 / 1259
页数:6
相关论文
共 50 条
  • [21] Second-Order Asymptotics of Sequential Hypothesis Testing
    Li, Yonglong
    Tan, Vincent Y. F.
    2020 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2020, : 1295 - 1300
  • [22] Second-Order Asymptotics of Sequential Hypothesis Testing
    Li, Yonglong
    Tan, Vincent Y. F.
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2020, 66 (11) : 7222 - 7230
  • [23] Second-order tail asymptotics of deflated risks
    Hashorva, Enkelejd
    Ling, Chengxiu
    Peng, Zuoxiang
    INSURANCE MATHEMATICS & ECONOMICS, 2014, 56 : 88 - 101
  • [24] A trapdoor one-way function for verifiable secret sharing
    Kanso, Ali
    Ghebleh, Mohammad
    HIGH-CONFIDENCE COMPUTING, 2022, 2 (02):
  • [25] MULTISTAGE SECRET SHARING BASED ON ONE-WAY FUNCTION
    HARN, L
    ELECTRONICS LETTERS, 1995, 31 (04) : 262 - 262
  • [26] MULTISTAGE SECRET SHARING BASED ON ONE-WAY FUNCTION
    HE, J
    DAWSON, E
    ELECTRONICS LETTERS, 1994, 30 (19) : 1591 - 1592
  • [27] Design and Implementation of One-Way Key Agreement Model for Enhancing VoIP Internet Phone Security
    Han, Kyusuk
    Shon, Taeshik
    Kim, Kwangjo
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2011, E94B (08) : 2235 - 2238
  • [28] A certificateless one-way group key agreement protocol for end-to-end email encryption
    Yeh, Jyh-haw
    Sridhar, Srisarguru
    Dagher, Gaby G.
    Sun, Hung-Min
    Shen, Ning
    White, Kathleen Dakota
    2018 IEEE 23RD PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING (PRDC), 2018, : 34 - 43
  • [29] Robust generalized MQV key agreement protocol without using one-way hash functions
    Tseng, YM
    COMPUTER STANDARDS & INTERFACES, 2002, 24 (03) : 241 - 246
  • [30] Vulnerabilities of generalized MQV key agreement protocol without using one-way hash functions
    Shim, Kyung-Ah
    COMPUTER STANDARDS & INTERFACES, 2007, 29 (04) : 467 - 470