Secret Key Agreement via Secure Omniscience

Research output: Journal Publications and ReviewsRGC 21 - Publication in refereed journalpeer-review

View graph of relations

Author(s)

  • Praneeth Kumar Vippathalla
  • Chung Chan
  • Navin Kashyap
  • Qiaoqiao Zhou

Related Research Unit(s)

Detail(s)

Original languageEnglish
Pages (from-to)8029-8053
Journal / PublicationIEEE Transactions on Information Theory
Volume69
Issue number12
Online published24 Oct 2023
Publication statusPublished - Dec 2023

Abstract

In this paper, we explore the connection between secret key agreement and secure omniscience within the setting of the multiterminal source model with an eavesdropper having side information. While the secret key agreement problem considers the generation of a maximum-rate secret key through public discussion, the secure omniscience problem is concerned with communication protocols for omniscience that minimize the rate of information leakage to the eavesdropper. The starting point of our work is a lower bound on the minimum leakage rate for omniscience, RL , in terms of the wiretap secret key capacity, CW. Our interest is in identifying broad classes of sources for which this lower bound is met with equality, in which case we say that there is a duality between secure omniscience and secret key agreement. We show that this duality holds in the case of certain finite linear source (FLS) models, such as two-terminal FLS models and pairwise independent network models on trees with a linear eavesdropper. Duality also holds for any FLS model in which CW is achieved by a perfect linear secret key agreement scheme. We conjecture that the duality in fact holds unconditionally for any FLS model. On the negative side, we give an example of a (non-FLS) source model for which duality does not hold if we limit ourselves to communication-for-omniscience protocols with at most two (interactive) communications. We also address the secure function computation problem and explore the connection between the minimum leakage rate for computing a function and the wiretap secret key capacity. © 2023 IEEE.

Research Area(s)

  • finite linear sources, Information theoretic security, leakage rate for omniscience, secret key generation, secure omniscience, tree-PIN model

Citation Format(s)

Secret Key Agreement via Secure Omniscience. / Vippathalla, Praneeth Kumar; Chan, Chung; Kashyap, Navin et al.
In: IEEE Transactions on Information Theory, Vol. 69, No. 12, 12.2023, p. 8029-8053.

Research output: Journal Publications and ReviewsRGC 21 - Publication in refereed journalpeer-review