Linking information reconciliation and privacy amplification

被引:116
作者
Cachin, C
Maurer, UM
机构
[1] Institute for Theoretical Computer Science, ETH Zürich
关键词
unconditional security; reconciliation; information reduction; privacy amplification; Renyi entropy; secret-key agreement; quantum cryptography;
D O I
10.1007/s001459900023
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Information reconciliation allows two parties knowing correlated random variables, such as a noisy version of the partner's random bit string, to agree ori a shared string. Privacy amplification allows two parties sharing a partially secret string about which an opponent has some partial information, to distill a shorter but almost completely secret key by communicating only over an insecure channel, as long as an upper bound on the opponent's knowledge about the string is known. The relation between these two techniques has not been well understood. In particular, it is important to understand the effect of side-information, obtained by the opponent through an initial reconciliation step, on the size of the secret key that can be distilled safely by subsequent privacy amplification. The purpose of this paper is to provide the missing link between these techniques by presenting bounds on the reduction of the Renyi entropy of a random variable induced by side-information. We show that, except with negligible probability, each bit of side-information reduces the size of the key that can be safely distilled by at most two bits. Moreover, in the important special case of side-information and raw key data generated by many independent repetitions of a random experiment, each bit of side-information reduces the size of the secret key by only about one bit. The results have applications in unconditionally secure key agreement protocols and in quantum cryptography.
引用
收藏
页码:97 / 110
页数:14
相关论文
共 13 条
[1]  
[Anonymous], 1961, CONTRIBUTIONS THEORY
[2]  
Bennett C. H., 1992, Journal of Cryptology, V5, P3, DOI 10.1007/BF00191318
[3]   Generalized privacy amplification [J].
Bennett, CH ;
Brassard, G ;
Crepeau, C ;
Maurer, UM .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1995, 41 (06) :1915-1923
[4]   PRIVACY AMPLIFICATION BY PUBLIC DISCUSSION [J].
BENNETT, CH ;
BRASSARD, G ;
ROBERT, JM .
SIAM JOURNAL ON COMPUTING, 1988, 17 (02) :210-229
[5]  
Blahut R.E., 1987, Principles and Practice of Information Theory
[6]  
Brassard G, 1995, LECT NOTES COMPUT SC, V1000, P1
[7]  
Brassard G., 1994, LECT NOTES COMPUTER, V765, P410, DOI [DOI 10.1007/3-540-48285-7_35, 10.1007/3-540-48285-7_35]
[8]  
CARTER L, 1979, J CSS, V18, P143, DOI DOI 10.1016/0022-0000(79)90044-8
[9]  
Cover T. M., 2005, ELEM INF THEORY, DOI 10.1002/047174882X
[10]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654