A Practical Protocol for Advantage Distillation and Information Reconciliation

作者: Shengli Liu , Henk C. A. Van Tilborg , Marten Van Dijk

DOI: 10.1023/A:1024755209150

关键词:

摘要: Information-theoretic secret key agreement generally consists of three phases, namely, advantage distillation information reconciliation and privacy amplification. Advantage is needed in the case when two legitimate users, Alice Bob, start a situation which inferior to that adversary Eve. The aim for them gain over Eve terms mutual between each other. Information enables Bob arrive at common string by error correction techniques. Finally they distill highly from amplification phase. For scenario where as well have access output binary symmetric source means (three) channels, there are several protocols proposed.  In this paper, we present general protocol implement both reconciliation. Simulation results compared with known protocols. A connection our given.

参考文章(20)
Ueli M. Maurer, Protocols for Secret Key Agreement by Public Discussion Based on Common Information international cryptology conference. pp. 461- 470 ,(1992) , 10.1007/3-540-48071-4_32
Gilles Brassard, Charles H Bennett, Jean-Marc Robert, How to reduce your enemy's information international cryptology conference. pp. 468- 476 ,(1986)
Kouichi Yamazaki, Tomohiro Sugimoto, A Study on Secret key Reconciliation Protocol "Cascade" IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. ,vol. 83, pp. 1987- 1991 ,(2000)
M. Van Dijk, H. Van Tilborg, The art of distilling [secret key generation] information theory workshop. pp. 158- 159 ,(1998) , 10.1109/ITW.1998.706493
Gilles Brassard, Louis Salvail, Secret-key reconciliation by public discussion theory and application of cryptographic techniques. pp. 410- 423 ,(1994) , 10.1007/3-540-48285-7_35
Christian Cachin, Ueli M Maurer, None, Linking information reconciliation and privacy amplification Journal of Cryptology. ,vol. 10, pp. 97- 110 ,(1997) , 10.1007/S001459900023
Charles H. Bennett, François Bessette, Gilles Brassard, Louis Salvail, John Smolin, Experimental quantum cryptography theory and application of cryptographic techniques. ,vol. 5, pp. 253- 265 ,(1991) , 10.1007/3-540-46877-3_23
U.M. Maurer, Secret key agreement by public discussion from common information IEEE Transactions on Information Theory. ,vol. 39, pp. 733- 742 ,(1993) , 10.1109/18.256484
M.J. Gander, U.M. Maurer, On the secret-key rate of binary random variables international symposium on information theory. pp. 351- ,(1994) , 10.1109/ISIT.1994.394667