One-Shot Variable-Length Secret Key Agreement Approaching Mutual Information

09/06/2018
by   Cheuk Ting Li, et al.
0

This paper studies an information-theoretic one-shot variable-length secret key agreement problem with public discussion. Let X and Y be jointly distributed random variables, each taking values in some measurable space. Alice and Bob observe X and Y respectively, can communicate interactively through a public noiseless channel, and want to agree on a key length and a key that is approximately uniformly distributed over all bit sequences with the agreed key length. The public discussion is observed by an eavesdropper, Eve. The key should be approximately independent of the public discussion, conditional on the key length. We show that the optimal expected key length is close to the mutual information I(X;Y) within a logarithmic gap. Moreover, an upper bound and a lower bound on the optimal expected key length can be written down in terms of I(X;Y) only. This means that the optimal one-shot performance is always within a small gap of the optimal asymptotic performance regardless of the distribution of the pair (X,Y). This one-shot result may find applications in situations where the components of an i.i.d. pair source (X^n,Y^n) are observed sequentially and the key is output bit by bit with small delay, or in situations where the random source is not an i.i.d. or ergodic process.

READ FULL TEXT
research
01/17/2019

One-Shot Perfect Secret Key Agreement for Finite Linear Sources

We consider a non-asymptotic (one-shot) version of the multiterminal sec...
research
08/07/2020

A Channel Model of Transceivers for Multiterminal Secret Key Agreement

Information theoretic secret key agreement is impossible without making ...
research
10/16/2017

An operational characterization of mutual information in algorithmic information theory

We show that the mutual information, in the sense of Kolmogorov complexi...
research
05/10/2019

A One-Round Key Agreement Protocol with Information-Theoretic Security

Information-theoretic secure key agreement protocols do not use computat...
research
10/04/2019

Secret key agreement for hypergraphical sources with limited total discussion

We consider the multiterminal secret key agreement problem under the tot...
research
02/26/2020

Secure and Reliable Key Agreement with Physical Unclonable Functions

Different transforms used in binding a secret key to correlated physical...
research
08/21/2018

Modes of Information Flow

Information flow between components of a system takes many forms and is ...

Please sign up or login with your details

Forgot password? Click here to reset