Secret key agreement from correlated data, with no prior information

10/09/2019
by   Marius Zimand, et al.
0

A fundamental question that has been studied in cryptography and in information theory is whether two parties can communicate confidentially using exclusively an open channel. We consider the model in which the two parties hold inputs that are correlated in a certain sense. This model has been studied extensively in information theory, and communication protocols have been designed which exploit the correlation to extract from the inputs a shared secret key. However, all the existing protocols are not universal in the sense that they require that the two parties also know some attributes of the correlation. In other words, they require that each party knows something about the other party's input. We present a protocol that does not require any prior additional information. It uses space-bounded Kolmogorov complexity to measure correlation and it allows the two legal parties to obtain a common key that looks random to an eavesdropper that observes the communication and is restricted to use a bounded amount of space for the attack. Thus the protocol achieves complexity-theoretical security, but it does not use any unproven result from computational complexity. On the negative side, the protocol is not efficient in the sense that the computation of the two legal parties uses more space than the space allowed to the adversary.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
04/28/2020

Communication Complexity of the Secret Key Agreement in Algorithmic Information Theory

It is known that the mutual information, in the sense of Kolmogorov comp...
research
05/05/2021

On the Communication Complexity of Key-Agreement Protocols

Key-agreement protocols whose security is proven in the random oracle mo...
research
05/02/2023

Spectral approach to the communication complexity of multi-party key agreement

In multi-party key agreement protocols it is assumed that the parties ar...
research
03/08/2021

Multiparty Protocol that Usually Shuffles

Multiparty computation is raising importance because it's primary object...
research
10/16/2017

An operational characterization of mutual information in algorithmic information theory

We show that the mutual information, in the sense of Kolmogorov complexi...
research
07/25/2017

Resource-Efficient Common Randomness and Secret-Key Schemes

We study common randomness where two parties have access to i.i.d. sampl...
research
08/21/2022

Efficient Multiparty Protocols Using Generalized Parseval's Identity and the Theta Algebra

We propose a protocol able to show publicly addition and multiplication ...

Please sign up or login with your details

Forgot password? Click here to reset