Message Transmission and Key Establishment: Conditions for Equality of Weak and Strong Capacities
Hadi Ahmadi
University of Calgary (joint work with Reihaneh Safavi-Naini)
October 25, 2012
1 / 20
Message Transmission and Key Establishment: Conditions for Equality - - PowerPoint PPT Presentation
Message Transmission and Key Establishment: Conditions for Equality of Weak and Strong Capacities Hadi Ahmadi University of Calgary (joint work with Reihaneh Safavi-Naini) October 25, 2012 1 / 20 Overview Secrecy capacity Secure message
1 / 20
◮ Discrete memoryless channels from Alice to Bob and Eve. ◮ Alice wants to send Bob a message that stays private from Eve. ◮ SMT is possible when Eve’s channel is noisier. 2 / 20
◮ Discrete memoryless channels from Alice to Bob and Eve. ◮ Alice wants to send Bob a message that stays private from Eve. ◮ SMT is possible when Eve’s channel is noisier. ◮ But how many message bits can be sent? 3 / 20
◮ Discrete memoryless channels from Alice to Bob and Eve. ◮ Alice wants to send Bob a message that stays private from Eve. ◮ SMT is possible when Eve’s channel is noisier. ◮ But how many message bits can be sent? infinite! 4 / 20
◮ Discrete memoryless channels from Alice to Bob and Eve. ◮ Alice wants to send Bob a message that stays private from Eve. ◮ SMT is possible when Eve’s channel is noisier. ◮ But how many message bits can be sent? infinite! ◮ Say how may message bits per channel use? That is secrecy
5 / 20
◮ Discrete memoryless channels from Alice to Bob and Eve. ◮ Alice wants to send Bob a message that stays private from Eve. ◮ SMT is possible when Eve’s channel is noisier. ◮ Secrecy capacity (the highest transmission rate) is derived as
ws =
U↔X↔(Y ,Z) I(U; Y ) − I(U; Z).
6 / 20
◮ Alice and Bob want to share a key that stays private from Eve. ◮ Secret key (SK) capacity: highest key rate in bits/channel use. ◮ SKE is like SMT in the wiretap channel setting.
wsk = C wc ws
7 / 20
◮ Alice and Bob want to share a key that stays private from Eve. ◮ Secret key (SK) capacity: highest key rate in bits/channel use. ◮ SKE is like SMT in the wiretap channel setting.
wsk = C wc ws
◮ By adding public discussion SK capacity increases.
wsk
wsk
8 / 20
◮ Motivation: use of weak security (negligible leakage rate). ◮ Proposal: define strong security (negligible absolute leakage). ◮ Problem: relation between the two.
9 / 20
10 / 20
◮ The proof is quite generic: slight modification makes it work
◮ But it does not apply to ALL existing setups
◮ This is general: works for any DM setup.
◮ Relies on implicit assumptions...
11 / 20
◮ Cost is n times that of the uniform protocol.
◮ Resources to send function description, say l bits.
◮ Resources to generate random seed, say r bits. ◮ Resources to send r-bit random seed.
◮ Free: does not require resource. 12 / 20
◮ Cost is n times that of the uniform protocol.
◮ Resources to send function description, say l bits.
◮ Resources to generate random seed, say r bits. ◮ Resources to send r-bit random seed.
◮ Free: does not require resource.
◮ the parameters l and r become negligible in cost, and ◮ The key size is close to n time that of uniform protocol. ◮ hence the key rate stays the same. 13 / 20
◮ Channel with positive (reliability) capacity. ◮ Free local source of randomness.
◮ Two-way wiretap channels [AS11] with zero reliability capacity. ◮ Secret key from noise [AS11*] with no random source.
◮ We remove the first assumption, i.e., need for randomness. ◮ Trick: using a two-source extractor for privacy amplification. 14 / 20
◮ Alice has (SA,1, SA,2) and Bob has (SB,1, SB,2). ◮ Cost is 2n times that of the uniform protocol.
◮ Gives (SA,1, SA,2) ≈ (SB,1, SB,2). ◮ Resources to send function description, say 2l bits.
◮ Gives S = TExt(SA,1, SA,2). ◮ Free: does not require resource.
◮ Free: does not require resource.
15 / 20
◮ Alice has (SA,1, SA,2) and Bob has (SB,1, SB,2). ◮ Cost is 2n times that of the uniform protocol.
◮ Gives (SA,1, SA,2) ≈ (SB,1, SB,2). ◮ Resources to send function description, say 2l bits.
◮ Gives S = TExt(SA,1, SA,2). ◮ Free: does not require resource.
◮ Free: does not require resource.
16 / 20
◮ Resources to generate random bits for expansion, say r bits.
◮ Cost equals that of weak protocol.
◮ Resources to send function description, say l bits.
◮ Free: does not require resource.
17 / 20
◮ Noisy two-way two-way channel YA = YB = XA + XB + N and
◮ Secure channel YB = XA + N′ and YE = ⊥, and no
18 / 20
19 / 20