Exponential Decreasing Rate of Leaked Information in Universal Random Privacy Amplification
From MaRDI portal
Publication:5273652
DOI10.1109/TIT.2011.2110950zbMATH Open1365.94483arXiv0904.0308MaRDI QIDQ5273652FDOQ5273652
Publication date: 12 July 2017
Published in: IEEE Transactions on Information Theory (Search for Journal in Brave)
Abstract: We derive a new upper bound for Eve's information in secret key generation from a common random number without communication. This bound improves on Bennett et al(1995)'s bound based on the R'enyi entropy of order 2 because the bound obtained here uses the R'enyi entropy of order for . This bound is applied to a wire-tap channel. Then, we derive an exponential upper bound for Eve's information. Our exponent is compared with Hayashi(2006)'s exponent. For the additive case, the bound obtained here is better. The result is applied to secret key agreement by public discussion.
Full work available at URL: https://arxiv.org/abs/0904.0308
Recommendations
- A joint Shannon cipher and privacy amplification approach to attaining exponentially decaying information leakage
- Tight Exponential Analysis of Universally Composable Privacy Amplification and Its Applications
- Quantifying information leakage of randomized protocols
- Quantifying information leakage of randomized protocols
- Asymptotic information leakage under one-try attacks
- Asymptotic information leakage under one-try attacks
- Privacy amplification with asymptotically optimal entropy loss
- Privacy amplification with asymptotically optimal entropy loss
Information theory (general) (94A15) Algebraic coding theory; cryptography (number-theoretic aspects) (11T71) Authentication, digital signatures and secret sharing (94A62)
Cited In (17)
- On an Almost-Universal Hash Function Family with Applications to Authentication and Secrecy Codes
- Information Theoretic Security for Encryption Based on Conditional Rényi Entropies
- Attacks on quantum key distribution protocols that employ non-ITS authentication
- When quantum memory is useful for dense coding
- Quantum Security Analysis via Smoothing of Renyi Entropy of Order 2
- Mosaics of combinatorial designs for information-theoretic security
- Relating different quantum generalizations of the conditional Rényi entropy
- Quantum key distribution with PRF(Hash, Nonce) achieves everlasting security
- Security analysis of the decoy method with the Bennett–Brassard 1984 protocol for finite key lengths
- Role of information theoretic uncertainty relations in quantum theory
- Simulation of a Random Variable and its Application to Game Theory
- A joint Shannon cipher and privacy amplification approach to attaining exponentially decaying information leakage
- Semantic security for quantum wiretap channels
- Precise evaluation of leaked information with secure randomness extraction in the presence of quantum attacker
- Common Information, Noise Stability, and Their Extensions
- Simpler statistically sender private oblivious transfer from ideals of cyclotomic integers
- Universal Covertness for Discrete Memoryless Sources
This page was built for publication: Exponential Decreasing Rate of Leaked Information in Universal Random Privacy Amplification
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5273652)