DocumentCode :
2275090
Title :
Secret key agreement under sampling attack
Author :
Muramatsu, Jun ; Yoshimura, Kazuyuki ; Arai, Ken´ichi ; Davis, Peter
Author_Institution :
NTT Commun. Sci. Lab., NTT Corp., Kyoto
fYear :
2005
fDate :
4-9 Sept. 2005
Firstpage :
2147
Lastpage :
2151
Abstract :
This paper considers the capacity for secret key agreement under a sampling attack. Given the number of the eavesdropper´s sources, we evaluate the secret key capacity bound which is defined as the supremum of the secret key capacity divided by the description length of the alphabet, where the supremum is taken over a set of probability distributions corresponding to the correlated sources. In particular, we consider symmetric sources and permutation-invariant sources. We derive inequalities which show the scaling of the secret key capacity bound with the number of the eavesdropper´s sources
Keywords :
data privacy; protocols; public key cryptography; statistical distributions; telecommunication security; correlated sources; description length; eavesdropper sources; permutation-invariant sources; probability distributions; sampling attack; secret key agreement; secret key capacity bound; symmetric sources; Capacity planning; Laboratories; Probability distribution; Protocols; Random variables; Sampling methods; Satellite broadcasting; Upper bound;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Theory, 2005. ISIT 2005. Proceedings. International Symposium on
Conference_Location :
Adelaide, SA
Print_ISBN :
0-7803-9151-9
Type :
conf
DOI :
10.1109/ISIT.2005.1523726
Filename :
1523726
Link To Document :
بازگشت