Multiple Private Key Generation for Continuous Memoryless Sources with A Helper

09/07/2020
by   Lin Zhou, et al.
0

We propose a method to study the secrecy constraints in key generation problems where side information might be present at untrusted users. Our method is inspired by a recent work of Hayashi and Tan who used the Rényi divergence as the secrecy measure to study the output statistics of applying hash functions to a random sequence. By generalizing the achievability result of Hayashi and Tan to the multi-terminal case, we obtain the output statistics of applying hash functions to multiple random sequences, which turn out to be an important tool in the achievability proof of strong secrecy capacity regions of key generation problems with side information at untrusted users. To illustrate the power of our method, we derive the capacity region of the multiple private key generation problem with an untrusted helper for continuous memoryless sources under Markov conditions. The converse proof of our result follows by generalizing a result of Nitinawarat and Narayan to the case with side information at untrusted users.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
02/12/2020

Fundamental Limits of Biometric Identification Systems with Strong Secrecy

The fundamental limits of biometric identification systems under a stron...
research
06/17/2021

Secure Multi-Function Computation with Private Remote Sources

We consider a distributed function computation problem in which parties ...
research
04/25/2023

Statistics of Random Binning Based on Tsallis Divergence

Random binning is a powerful and widely used tool in information theory....
research
07/29/2020

Feedback Capacities of Gaussian Multiple-Access Wiretap Channels

The feedback capacities of the Gaussian multiple-access channel (GMAC) a...
research
11/28/2018

Cooperative Resolvability and Secrecy in the Cribbing Multiple-Access Channel

We study channel resolvability for the discrete memoryless multiple-acce...
research
11/19/2018

Semantic Security and the Second-Largest Eigenvalue of Biregular Graphs

It is investigated how to achieve semantic security for the wiretap chan...
research
04/25/2019

Multiterminal Secret Key Agreement with Nearly No Discussion

We consider the secret key agreement problem under the multiterminal sou...

Please sign up or login with your details

Forgot password? Click here to reset