首页> 外文会议>Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003 Sep 21-23, 2003 St.Petersburg, Russia >Achieveability of the Key-Capacity in a Scenario of Key Sharing by Public Discussion and in the Presence of Passive Eavesdropper
【24h】

Achieveability of the Key-Capacity in a Scenario of Key Sharing by Public Discussion and in the Presence of Passive Eavesdropper

机译:在公开讨论的密钥共享场景中以及在存在被动窃听者的情况下密钥容量的可实现性

获取原文
获取原文并翻译 | 示例

摘要

We consider a scenario of key sharing between a pair of legal users in the presence of passive eavesdropper. In this setting it is assumed the existence of a noisy channel between legal parties and also the existence of a noisy wire-tap channel (which is not necessary inferior to the main channel). In addition to noisy channel there is a noiseless public channel connecting legal parties. This means that eavesdropper can receive without errors all messages transmitted through this noiseless channel. Because eavesdropper is passive (by our assumption) this illegal party is unable to change any message transmitting by legal parties both over noisy and noiseless channel. The final goal of legal parties is to arrange such date exchange protocol using both noisy and noiseless channels that provides them with bit strings K_A and K_B of the same length l possessing the following properties: the probability P_e of their discrepancy is close to zero; the amount of information I_0 about these strings leaking to eavesdropper is close to zero. Legal parties have nothing secret date shared in advance except the knowledge of protocol and channel parameters that are known also for eavesdropper. The key-rate R_k is the ratio of the string length l to the length of the string transmitted between legal users through noisy channel. Key-capacity C_k is the maximum possible key-rate when P_e and I_0 approach both to zero. For some particular cases of noisy channels key-capacity has been found by U. Maurer. But it was open problem how to reach this capacity with limited computing power. The authors presented at previous MMM-ACNS'2001 workshop the constructive methods of key sharing for the same model. But for some channel parameters the key rates differed key-capacity in the several orders! In the current paper we use another protocol of key sharing and demonstrate how near to key-capacity can be provided the key-rate depending on complexity of key-sharing protocol.
机译:我们考虑在存在被动窃听者的情况下一对合法用户之间共享密钥的情况。在这种情况下,假定法人之间存在一个嘈杂的通道,并且还存在一个嘈杂的窃听通道(不必次于主要通道)。除了嘈杂的频道外,还有一个无噪音的公共频道,可连接法人团体。这意味着窃听者可以毫无错误地接收通过此无噪音通道发送的所有消息。由于窃听者是被动的(根据我们的假设),该非法方无法更改合法方在嘈杂和无噪声的通道上传输的任何消息。合法方的最终目标是使用嘈杂的通道和无噪声的通道来安排这种日期交换协议,从而为它们提供长度为l的相同长度的位串K_A和K_B,它们具有以下特性:差异的概率P_e接近于零;关于这些字符串泄漏到窃听者的信息I_0的数量接近于零。除了协议和通道参数的知识(窃听者也知道)之外,法人方没有提前共享任何秘密日期。密钥率R_k是字符串长度l与合法用户之间通过噪声信道传输的字符串长度之比。密钥容量C_k是当P_e和I_0都接近零时的最大可能密钥率。对于某些嘈杂的频道,U。Maurer已发现了密钥容量。但是,如何在有限的计算能力下达到这一能力是一个悬而未决的问题。作者在先前的MMM-ACNS'2001研讨会上介绍了相同模型的密钥共享的构造方法。但是对于某些通道参数,密钥速率在几个订单中具有不同的密钥容量!在当前的论文中,我们使用另一种密钥共享协议,并演示了如何根据密钥共享协议的复杂性来提供接近密钥容量的密钥速率。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号