...
【24h】

Multiterminal Secrecy by Public Discussion

机译:通过公开讨论进行多终端保密

获取原文
   

获取外文期刊封面封底 >>

       

摘要

This monograph describes principles of information theoretic secrecy generation by legitimate parties with public discussion in the presence of an eavesdropper. The parties are guaranteed secrecy in the form of independence from the eavesdropper's observation of the communication. Part I develops basic technical tools for secrecy generation, many of which are potentially of independent interest beyond secrecy settings. Various information theoretic and cryptographic notions of secrecy are compared. Emphasis is placed on central themes of interactive communication and common randomness as well as on core methods of balanced coloring and leftover hash for extracting secret uniform randomness. Achievability and converse results are shown to emerge from "single shot" incarnations that serve to explain essential structure. Part II applies the methods of Part I to secrecy generation in two settings: a multiterminal source model and a multiterminal channel model, in both of which the legitimate parties are afforded privileged access to correlated observations of which the eavesdropper has only partial knowledge. Characterizations of secret key capacity bring out inherent connections to the data compression concept of omniscience and, for a specialized source model, to a combinatorial problem of maximal spanning tree packing in a multigraph. Interactive common information is seen to govern the minimum rate of communication needed to achieve secret key capacity in the two-terminal source model. Furthermore, necessary and sufficient conditions are analyzed for the secure computation of a given function in the multiterminal source model. Based largely on known recent results, this self-contained monograph also includes new formulations with associated new proofs. Supplementing each chapter in Part II are descriptions of several open problems.
机译:此专着描述了合法方在窃听者在场的情况下通过公开讨论生成信息理论保密的原理。从窃听者对通讯的观察中保证当事人的独立性。第一部分开发了用于生成秘密信息的基本技术工具,其中许多可能在保密设置之外具有独立的意义。比较了各种信息理论和保密概念。重点放在交互式通信和常见随机性的中心主题上,以及平衡的着色和剩余哈希值的核心方法中,以提取秘密的均匀随机性。结果表明,可实现性和相反的结果来自“单发”化身,用以解释基本结构。第二部分在两种情况下将第一部分的方法应用于保密性生成:多终端源模型和多终端通道模型,在这两种情况下,合法方都可以特权获得对相关信息的特权访问,而窃听者仅具有部分知识。密钥容量的表征带来了与全知的数据压缩概念固有的联系,对于一个专门的源模型,它与多重图中最大生成树包装的组合问题有着内在的联系。交互式公共信息被视为支配在两终端源模型中实现密钥容量所需的最小通信速率。此外,为在多终端源模型中安全计算给定函数,分析了必要条件和充分条件。这本自成体系的专着主要基于最近的已知结果,还包括带有相关新证据的新表述。在第二部分的每一章的补充是对几个未解决问题的描述。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号