Title :
Secret-key agreement over unauthenticated public channels .II. Privacy amplification
Author :
Maurer, Ueli ; Wolf, Stefan
Author_Institution :
Dept. of Comput. Sci., Swiss Fed. Inst. of Technol., Zurich, Switzerland
fDate :
4/1/2003 12:00:00 AM
Abstract :
For pt. II see ibid., vol.49, no.4, p.832-38 (2003). Here, we consider the special case where the legitimate partners already share a mutual string which might, however, be partially known to the adversary. The problem of generating a secret key in this case has been well studied in the passive-adversary model - for instance, in the context of quantum key agreement - under the name of privacy amplification. We consider the same problem with respect to an active adversary and propose two protocols, one based on universal hashing and one based on extractors, allowing for privacy amplification secure against an adversary whose knowledge about the initial partially secret string is limited to one third of the length of this string. Our results are based on novel techniques for authentication secure even against adversaries knowing a substantial amount of the "secret" key.
Keywords :
message authentication; protocols; quantum cryptography; cryptography; legitimate partners; mutual string sharing; partially secret string; passive-adversary model; privacy amplification; protocols; quantum key agreement; secret key generation; secret-key agreement; string length; unauthenticated public channels; unconditional security; universal hashing; Authentication; Complexity theory; Computer science; Context modeling; Cryptographic protocols; Cryptography; Entropy; Information security; Materials science and technology; Privacy;
Journal_Title :
Information Theory, IEEE Transactions on
DOI :
10.1109/TIT.2003.809559