Title :
Secret key agreement under sampling attack
Author :
Muramatsu, Jun ; Yoshimura, Kazuyuki ; Arai, Ken´ichi ; Davis, Peter
Author_Institution :
NTT Commun. Sci. Lab., NTT Corp., Kyoto
Abstract :
This paper considers the capacity for secret key agreement under a sampling attack. Given the number of the eavesdropper´s sources, we evaluate the secret key capacity bound which is defined as the supremum of the secret key capacity divided by the description length of the alphabet, where the supremum is taken over a set of probability distributions corresponding to the correlated sources. In particular, we consider symmetric sources and permutation-invariant sources. We derive inequalities which show the scaling of the secret key capacity bound with the number of the eavesdropper´s sources
Keywords :
data privacy; protocols; public key cryptography; statistical distributions; telecommunication security; correlated sources; description length; eavesdropper sources; permutation-invariant sources; probability distributions; sampling attack; secret key agreement; secret key capacity bound; symmetric sources; Capacity planning; Laboratories; Probability distribution; Protocols; Random variables; Sampling methods; Satellite broadcasting; Upper bound;
Conference_Titel :
Information Theory, 2005. ISIT 2005. Proceedings. International Symposium on
Conference_Location :
Adelaide, SA
Print_ISBN :
0-7803-9151-9
DOI :
10.1109/ISIT.2005.1523726