A One-Round Key Agreement Protocol with Information-Theoretic Security

05/10/2019
by   Setareh Sharifian, et al.
0

Information-theoretic secure key agreement protocols do not use computational assumptions and will stay secure with future advances in computing technologies. We consider a setting where Alice and Bob have access to correlated variables, and use a public channel to interact and obtain a shared secret key. Efficiency of protocols in this setting is measured by the secret key rate which is asymptotically upper bounded by the secret key capacity of the setting. Recently a tight bound for key rate in finite length regime was derived and an optimal protocol that achieves the asymptotic and finite length bounds was proposed. The protocol, however, requires many rounds of interactions. In this paper, we propose a noninteractive protocol with optimal asymptotic and near-optimal finite length performance. We prove security and efficiency of the protocol and give a modified version of the protocol that significantly improves computation cost of the parties by sacrificing some of the key rate. We show how this trade-off is achievable by controlling the parameters of the system.

READ FULL TEXT
research
08/07/2020

A Channel Model of Transceivers for Multiterminal Secret Key Agreement

Information theoretic secret key agreement is impossible without making ...
research
02/03/2021

Information-theoretic Key Encapsulation and its Application to Secure Communication

A hybrid encryption scheme is a public key encryption system that consis...
research
05/02/2023

Spectral approach to the communication complexity of multi-party key agreement

In multi-party key agreement protocols it is assumed that the parties ar...
research
02/01/2021

Mosaics of combinatorial designs for information-theoretic security

We study security functions which can serve to establish semantic securi...
research
12/27/2022

Information-theoretically secure equality-testing protocol with dispute resolution

There are often situations where two remote users each have data, and wi...
research
09/06/2018

One-Shot Variable-Length Secret Key Agreement Approaching Mutual Information

This paper studies an information-theoretic one-shot variable-length sec...
research
01/24/2018

On the Gold Standard for Security of Universal Steganography

While symmetric-key steganography is quite well understood both in the i...

Please sign up or login with your details

Forgot password? Click here to reset