Upper Bounds via Lamination on the Constrained Secrecy Capacity of Hypergraphical Sources

05/03/2018
by   Chung Chan, et al.
0

Hypergraphical sources are a natural class of sources for secret key generation, within which different subsets of terminals sharing secrets are allowed to discuss publicly in order to agree upon a global secret key. While their secrecy capacity, i.e., the maximum rate of a secret key that can be agreed upon by the entire set of terminals, is well-understood, what remains open is the maximum rate of a secret key that can be generated when there is a restriction on the overall rate of public discussion allowed. In this work, we obtain a family of explicitly computable upper bounds on the number of bits of secret key that can be generated per bit of public discussion. These upper bounds are derived using a lamination technique based on the submodularity of the entropy function. In particular, a specific instance of these upper bounds, called the edge-partition bound, is shown to be tight for the pairwise independent network model, a special case of the hypergraphical source. The secret key generation scheme achieving this upper bound is the tree-packing protocol of Nitinawarat et al., thereby resolving in the affirmative the discussion rate optimality of the tree packing protocol.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
10/04/2019

Secret key agreement for hypergraphical sources with limited total discussion

We consider the multiterminal secret key agreement problem under the tot...
research
02/24/2019

Secret Key Capacity For Multipleaccess Channel With Public Feedback

We consider the generation of a secret key (SK) by the inputs and the ou...
research
01/23/2019

Unique Information and Secret Key Decompositions

The unique information (UI) is an information measure that quantifies a ...
research
04/28/2023

Randomness Requirements for Three-Secret Sharing

We study a secret sharing problem with three secrets where the secrets a...
research
12/12/2012

A New Class of Upper Bounds on the Log Partition Function

Bounds on the log partition function are important in a variety of conte...
research
04/05/2019

Optimal Communication Rates for Zero-Error Distributed Simulation under Blackboard Communication Protocols

We study the distributed simulation problem where n users aim to generat...
research
04/25/2019

Multiterminal Secret Key Agreement with Nearly No Discussion

We consider the secret key agreement problem under the multiterminal sou...

Please sign up or login with your details

Forgot password? Click here to reset