• DocumentCode
    588251
  • Title

    Privacy amplification theorem for bounded storage eavesdropper

  • Author

    Watanabe, Shigetaka ; Oohama, Yasutada

  • Author_Institution
    Dept. of Inf. Sci. & Intell. Syst., Univ. of Tokushima, Tokushima, Japan
  • fYear
    2012
  • fDate
    3-7 Sept. 2012
  • Firstpage
    177
  • Lastpage
    181
  • Abstract
    In this paper, we consider a situation such that legitimate parties, Alice and Bob, share an identical source to generate a secret key, and an eavesdropper, Eve, can access a correlated data that is stored in a storage with bounded size. Then, Alice and Bob want to extract a secret as long as possible. We show a privacy amplification theorem for this problem, i.e., we clarify the rate of key generation for given rate of Eve´s storage. The problem can be regarded as a dual randomness generation problem of the Wyner-Ahlswede-Körner type source coding system, and the techniques used in the proof are exchanged, i.e., the so-called Markov lemma is used in the converse part, and the so-called image size characterization is used in the direct part.
  • Keywords
    data privacy; private key cryptography; public key cryptography; theorem proving; Markov lemma; Wyner-Ahlswede-Korner type source coding system; bounded size; bounded storage eavesdropper; dual randomness generation problem; image size characterization; privacy amplification theorem; secret key generation; Manganese; Privacy; Random variables; Source coding; Tin; Zinc;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Information Theory Workshop (ITW), 2012 IEEE
  • Conference_Location
    Lausanne
  • Print_ISBN
    978-1-4673-0224-1
  • Electronic_ISBN
    978-1-4673-0222-7
  • Type

    conf

  • DOI
    10.1109/ITW.2012.6404652
  • Filename
    6404652