Skip to main content

Privacy Amplification Theorem for Noisy Main Channel

  • Conference paper
  • First Online:
Information Security (ISC 2001)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2200))

Included in the following conference series:

Abstract

Secret key agreement protocol between legal parties based on reconciliation and privacy amplification procedure has been considered in [2]. The so called privacy amplification theorem is used to estimate the amount of Shannon’s information leaking to an illegal party (passive eavesdropper) about the final key.We consider a particular case where one of the legal parties (Alice) sends to another legal party (Bob) a random binary string x through a binary symmetric channel (BSC) with bit error probability ε m while an eavesdropper (Eve) receives this string through an independent BSC with bit error probability ε w. We assume that ε m < ε w and hence the main channel is superior to the wire-tap channel. To reconcile the strings between legal parties Alice sends to Bob through noiseless channel the check string y based on some good error correcting code. Since this transmission is completely public Eve can eavesdrop it and therefore this extra information has to be taken into account in an estimation of the information leaking to Eve about the final key. In [3] an inequality has been proved to upper bound the information of Eve in such scenario. The main contribution of the running paper is to improve this inequality and hence to enhance the privacy amplification theorem. We present also bounds for the probability of false reconciliation when the check symbols of the linear code are transmitted through noiseless channel. The presented results can be very useful when considering the non-asymptotic case.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ash, R.B. “Information Theory”. Dover, New York, 1990.

    MATH  Google Scholar 

  2. Bennett, C. H., Brassard, G., Maurer, U.M. “Generalized Privacy Amplification”. IEEE Trans. on IT, vol. 41, nr. 6, pp. 1915–1923. 1995.

    Article  MATH  MathSciNet  Google Scholar 

  3. Cachin, C., Maurer, U. M. “Linking Information-Reconciliation and Privacy Amplification”. Eurocrypt’94: Advances in cryptology, Lecture Notes in Computer Science, vol. 950, pp. 267–274. Springer-Verlag. 1995.

    Chapter  Google Scholar 

  4. Massey, J.L. “Linear Codes with Complimentary Duals”. Discrete Math., 106/107. 1992.

    Google Scholar 

  5. Maurer, G. “Secret Key Agreement by Public Discussion Based on Common Information”. IEEE Trans. on I. T., vol. 39, nr. 3, 1998, p. 733–742.

    Article  MathSciNet  Google Scholar 

  6. Sendrier, N. “On the dimension of the hull”. SIAM Journal on Discrete Mathematics, vol. 4, nr. 2, pp. 282–293, 1997.

    Article  MathSciNet  Google Scholar 

  7. Stinson, D.R.. “Universal Hashing and Authentication Codes”. Advances in cryptology, Crypto’91, Lecture Notes in Computer Science, vol. 576, 1992, pp. 74–85. Springer-Verlag. 1992.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Korjik, V., Morales-Luna, G., Balakirsky, V.B. (2001). Privacy Amplification Theorem for Noisy Main Channel. In: Davida, G.I., Frankel, Y. (eds) Information Security. ISC 2001. Lecture Notes in Computer Science, vol 2200. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45439-X_2

Download citation

  • DOI: https://doi.org/10.1007/3-540-45439-X_2

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-42662-2

  • Online ISBN: 978-3-540-45439-7

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics