Common randomness and secret key generation with a helper

被引:206
作者
Csiszár, I
Narayan, P
机构
[1] Hungarian Acad Sci, A Renyi Inst Math, H-1364 Budapest, Hungary
[2] Univ Maryland, Dept Elect & Comp Engn, College Pk, MD 20742 USA
[3] Univ Maryland, Syst Res Inst, College Pk, MD 20742 USA
基金
美国国家航空航天局;
关键词
capacity; common randomness; correlated sources; multiuser information theory; private key; secret key; wiretapper;
D O I
10.1109/18.825796
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We consider the generation of common randomness (CR), secret or not secret, by two user terminals with aid from a "helper" terminal. Each terminal observes a different component of a discrete memoryless multiple source. The helper aids the users by transmitting information to them over a noiseless public channel subject to a rate constraint, Furthermore, one of the users is allowed to transmit to the other user over a public channel under a similar rate constraint. We study the maximum rate of CR which can be thus generated, including under additional secrecy conditions when it must be concealed from a wiretapper. Lower bounds for the corresponding capacities are provided, and single-letter capacity formulas are obtained for several special cases of interest.
引用
收藏
页码:344 / 366
页数:23
相关论文
共 14 条
[1]   Common randomness in information theory and cryptography - Part II: CR capacity [J].
Ahlswede, R ;
Csiszar, I .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1998, 44 (01) :225-240
[2]   COMMON RANDOMNESS IN INFORMATION-THEORY AND CRYPTOGRAPHY .1. SECRET SHARING [J].
AHLSWEDE, R ;
CSISZAR, I .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1993, 39 (04) :1121-1132
[3]  
AHLSWEDE R, 1996, PROBL PERED INFORM, V32, P144
[4]  
[Anonymous], 1996, PROBLEMY PEREDACHI I
[5]   Generalized privacy amplification [J].
Bennett, CH ;
Brassard, G ;
Crepeau, C ;
Maurer, UM .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1995, 41 (06) :1915-1923
[6]  
CSISZAR I, 1981, INFORMATION THEORY C
[7]  
Gacs P., 1973, Problems of Control and Information Theory, V2, P149
[8]  
Maurer U, 1997, LECT NOTES COMPUT SC, V1294, P307
[9]  
Maurer U., 1997, Advances in Cryptology - EUROCRYPT '97. International Conference on the Theory and Application of Cryptographic Techniques Proceedings, P209
[10]  
MAURER UM, 1993, IEEE T INFORM THEORY, V39, P733, DOI 10.1109/18.256484