Key Distribution Protocols Based on Extractors Under the Condition of Noisy Channels in the Presence of an Active Adversary

We consider in this paper the information-theoretic secure key distribution problem over main and wire-tap noise channels with a public discussion in presence of an active adversary. In contrast to the solution proposed by ourselves for a similar problem using hashing for privacy amplification, in t...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Yakovlev, Viktor, Korzhik, Valery, Morales-Luna, Guillermo, Bakaev, Mihail
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator Yakovlev, Viktor
Korzhik, Valery
Morales-Luna, Guillermo
Bakaev, Mihail
description We consider in this paper the information-theoretic secure key distribution problem over main and wire-tap noise channels with a public discussion in presence of an active adversary. In contrast to the solution proposed by ourselves for a similar problem using hashing for privacy amplification, in the current paper we use a technique of extractors. We propose modified key distribution protocols for which we prove explicit estimates of key rates without the use of estimates with uncertain coefficients in notations $O,\Omega,\Theta$. This leads in the new conclusion that the use of extractors is superior to the use of hash functions only with the very large key lengths $\ell$ (of order $\ell>10^5$ bits). We suggest hybrid key distribution protocols consisting from two consecutively executed stages. At the fist stage it is generated a short authentication key based on hash function, whereas at the second stage it is generated the final key with the use of extractors. We show that in fact the use of extraction procedure is effective only at the second stage. We get also some constructive estimates of the key rates for such protocols.
doi_str_mv 10.48550/arxiv.1005.3184
format Article
fullrecord <record><control><sourceid>arxiv_GOX</sourceid><recordid>TN_cdi_arxiv_primary_1005_3184</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1005_3184</sourcerecordid><originalsourceid>FETCH-LOGICAL-a654-d83a6e7752d382b45005c75da4e9dd1c9ed8c4895f5d6d702016689e067157483</originalsourceid><addsrcrecordid>eNotkEtPwzAQhH3hgAp3Tsh_IMFu_MoxhPIQFfRQzpFrb1RLxUa2iRrx50kCp5VW883uDEI3lJRMcU7udDy7oaSE8LKiil2in1cY8YNLObrDd3bB410MOZhwSvheJ7B4Wm3OOWqTQ0z4w1uIOB8Bt8FbtxChx2_BpRG3R-09TKTzi2QXIYE3MCu0x43JbgDc2AFi0nG8Qhe9PiW4_p8rtH_c7NvnYvv-9NI220ILzgqrKi1ASr62lVofGJ-eN5JbzaC2lpoarDJM1bznVlhJ1oQKoWogQlIumapW6PbPdgnffUX3OR3v5hK6uYTqF04UV80</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Key Distribution Protocols Based on Extractors Under the Condition of Noisy Channels in the Presence of an Active Adversary</title><source>arXiv.org</source><creator>Yakovlev, Viktor ; Korzhik, Valery ; Morales-Luna, Guillermo ; Bakaev, Mihail</creator><creatorcontrib>Yakovlev, Viktor ; Korzhik, Valery ; Morales-Luna, Guillermo ; Bakaev, Mihail</creatorcontrib><description>We consider in this paper the information-theoretic secure key distribution problem over main and wire-tap noise channels with a public discussion in presence of an active adversary. In contrast to the solution proposed by ourselves for a similar problem using hashing for privacy amplification, in the current paper we use a technique of extractors. We propose modified key distribution protocols for which we prove explicit estimates of key rates without the use of estimates with uncertain coefficients in notations $O,\Omega,\Theta$. This leads in the new conclusion that the use of extractors is superior to the use of hash functions only with the very large key lengths $\ell$ (of order $\ell&gt;10^5$ bits). We suggest hybrid key distribution protocols consisting from two consecutively executed stages. At the fist stage it is generated a short authentication key based on hash function, whereas at the second stage it is generated the final key with the use of extractors. We show that in fact the use of extraction procedure is effective only at the second stage. We get also some constructive estimates of the key rates for such protocols.</description><identifier>DOI: 10.48550/arxiv.1005.3184</identifier><language>eng</language><subject>Computer Science - Information Theory ; Mathematics - Information Theory</subject><creationdate>2010-05</creationdate><rights>http://arxiv.org/licenses/nonexclusive-distrib/1.0</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>228,230,780,885</link.rule.ids><linktorsrc>$$Uhttps://arxiv.org/abs/1005.3184$$EView_record_in_Cornell_University$$FView_record_in_$$GCornell_University$$Hfree_for_read</linktorsrc><backlink>$$Uhttps://doi.org/10.48550/arXiv.1005.3184$$DView paper in arXiv$$Hfree_for_read</backlink></links><search><creatorcontrib>Yakovlev, Viktor</creatorcontrib><creatorcontrib>Korzhik, Valery</creatorcontrib><creatorcontrib>Morales-Luna, Guillermo</creatorcontrib><creatorcontrib>Bakaev, Mihail</creatorcontrib><title>Key Distribution Protocols Based on Extractors Under the Condition of Noisy Channels in the Presence of an Active Adversary</title><description>We consider in this paper the information-theoretic secure key distribution problem over main and wire-tap noise channels with a public discussion in presence of an active adversary. In contrast to the solution proposed by ourselves for a similar problem using hashing for privacy amplification, in the current paper we use a technique of extractors. We propose modified key distribution protocols for which we prove explicit estimates of key rates without the use of estimates with uncertain coefficients in notations $O,\Omega,\Theta$. This leads in the new conclusion that the use of extractors is superior to the use of hash functions only with the very large key lengths $\ell$ (of order $\ell&gt;10^5$ bits). We suggest hybrid key distribution protocols consisting from two consecutively executed stages. At the fist stage it is generated a short authentication key based on hash function, whereas at the second stage it is generated the final key with the use of extractors. We show that in fact the use of extraction procedure is effective only at the second stage. We get also some constructive estimates of the key rates for such protocols.</description><subject>Computer Science - Information Theory</subject><subject>Mathematics - Information Theory</subject><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2010</creationdate><recordtype>article</recordtype><sourceid>GOX</sourceid><recordid>eNotkEtPwzAQhH3hgAp3Tsh_IMFu_MoxhPIQFfRQzpFrb1RLxUa2iRrx50kCp5VW883uDEI3lJRMcU7udDy7oaSE8LKiil2in1cY8YNLObrDd3bB410MOZhwSvheJ7B4Wm3OOWqTQ0z4w1uIOB8Bt8FbtxChx2_BpRG3R-09TKTzi2QXIYE3MCu0x43JbgDc2AFi0nG8Qhe9PiW4_p8rtH_c7NvnYvv-9NI220ILzgqrKi1ASr62lVofGJ-eN5JbzaC2lpoarDJM1bznVlhJ1oQKoWogQlIumapW6PbPdgnffUX3OR3v5hK6uYTqF04UV80</recordid><startdate>20100518</startdate><enddate>20100518</enddate><creator>Yakovlev, Viktor</creator><creator>Korzhik, Valery</creator><creator>Morales-Luna, Guillermo</creator><creator>Bakaev, Mihail</creator><scope>AKY</scope><scope>AKZ</scope><scope>GOX</scope></search><sort><creationdate>20100518</creationdate><title>Key Distribution Protocols Based on Extractors Under the Condition of Noisy Channels in the Presence of an Active Adversary</title><author>Yakovlev, Viktor ; Korzhik, Valery ; Morales-Luna, Guillermo ; Bakaev, Mihail</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-a654-d83a6e7752d382b45005c75da4e9dd1c9ed8c4895f5d6d702016689e067157483</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2010</creationdate><topic>Computer Science - Information Theory</topic><topic>Mathematics - Information Theory</topic><toplevel>online_resources</toplevel><creatorcontrib>Yakovlev, Viktor</creatorcontrib><creatorcontrib>Korzhik, Valery</creatorcontrib><creatorcontrib>Morales-Luna, Guillermo</creatorcontrib><creatorcontrib>Bakaev, Mihail</creatorcontrib><collection>arXiv Computer Science</collection><collection>arXiv Mathematics</collection><collection>arXiv.org</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Yakovlev, Viktor</au><au>Korzhik, Valery</au><au>Morales-Luna, Guillermo</au><au>Bakaev, Mihail</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Key Distribution Protocols Based on Extractors Under the Condition of Noisy Channels in the Presence of an Active Adversary</atitle><date>2010-05-18</date><risdate>2010</risdate><abstract>We consider in this paper the information-theoretic secure key distribution problem over main and wire-tap noise channels with a public discussion in presence of an active adversary. In contrast to the solution proposed by ourselves for a similar problem using hashing for privacy amplification, in the current paper we use a technique of extractors. We propose modified key distribution protocols for which we prove explicit estimates of key rates without the use of estimates with uncertain coefficients in notations $O,\Omega,\Theta$. This leads in the new conclusion that the use of extractors is superior to the use of hash functions only with the very large key lengths $\ell$ (of order $\ell&gt;10^5$ bits). We suggest hybrid key distribution protocols consisting from two consecutively executed stages. At the fist stage it is generated a short authentication key based on hash function, whereas at the second stage it is generated the final key with the use of extractors. We show that in fact the use of extraction procedure is effective only at the second stage. We get also some constructive estimates of the key rates for such protocols.</abstract><doi>10.48550/arxiv.1005.3184</doi><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier DOI: 10.48550/arxiv.1005.3184
ispartof
issn
language eng
recordid cdi_arxiv_primary_1005_3184
source arXiv.org
subjects Computer Science - Information Theory
Mathematics - Information Theory
title Key Distribution Protocols Based on Extractors Under the Condition of Noisy Channels in the Presence of an Active Adversary
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-14T08%3A18%3A37IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-arxiv_GOX&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Key%20Distribution%20Protocols%20Based%20on%20Extractors%20Under%20the%20Condition%20of%20Noisy%20Channels%20in%20the%20Presence%20of%20an%20Active%20Adversary&rft.au=Yakovlev,%20Viktor&rft.date=2010-05-18&rft_id=info:doi/10.48550/arxiv.1005.3184&rft_dat=%3Carxiv_GOX%3E1005_3184%3C/arxiv_GOX%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true