New Properties of Intrinsic Information and Their Relation to Bound Secrecy

08/17/2023
by   Andrey Khesin, et al.
0

The secret-key rate measures the rate at which Alice and Bob can extract secret bits from sampling a joint probability distribution, unknown to an eavesdropper Eve. The secret-key rate has been bounded above by the intrinsic information and reduced intrinsic information. However, we prove that the reduced intrinsic information is 0 if and only if the intrinsic information is 0. This result implies that at least one of the following two conjectures is false: bound secrecy exists, or the reduced intrinsic information equals the secret-key rate. We give an explicit construction of an information-erasing binarization for a candidate for bound secrecy. We then introduce some approaches for proving the existence of bound secrecy, such as reducing the channel space, linearly transforming Bob's map, and perturbing a channel for Eve.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
05/08/2018

Secrecy Capacity under Limited Discussion Rate for Minimally Connected Hypergraphical Sources

We investigate the secret key generation in the multiterminal source mod...
research
05/19/2021

On the Secrecy Capacity of 2-user Gaussian Z-Interference Channel with Shared Key

In this paper, the role of secret key with finite rate is studied to enh...
research
06/21/2022

Secret key generation from Gaussian sources using lattice-based extractors

We propose a lattice-based scheme for secret key generation from Gaussia...
research
02/14/2018

Multiterminal Secret Key Agreement at Asymptotically Zero Discussion Rate

In the multiterminal secret key agreement problem, a set of users want t...
research
10/04/2019

Secret key agreement for hypergraphical sources with limited total discussion

We consider the multiterminal secret key agreement problem under the tot...
research
04/28/2018

Towards Practical Implementation of Deep Random Secrecy

We have formerly introduced Deep Random Secrecy, a new cryptologic techn...
research
02/20/2021

A Novel Key Generation Scheme Using Quaternary PUF Responses and Wiretap Polar Coding

Physical unclonable functions (PUFs) are widely considered in secret key...

Please sign up or login with your details

Forgot password? Click here to reset