Skip to main content

A Secret Common Information Duality for Tripartite Noisy Correlations

  • Conference paper
  • First Online:
Security in Computing and Communications (SSCC 2015)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 536))

Included in the following conference series:

Abstract

We explore the duality between the simulation and extraction of secret correlations in light of a similar well-known operational duality between the two notions of common information due to Wyner, and Gács and Körner. For the inverse problem of simulating a tripartite noisy correlation from noiseless secret key and unlimited public communication, we show that Winter’s (2005) result for the key cost in terms of a conditional version of Wyner’s common information can be simply reexpressed in terms of the existence of a bipartite protocol monotone. For the forward problem of key distillation from noisy correlations, we construct simple distributions for which the conditional Gács and Körner common information achieves a tight bound on the secret key rate. We conjecture that this holds in general for non-communicative key agreement models. We also comment on the interconvertibility of secret correlations under local operations and public communication.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Given jointly distributed RVs \((X,Y,Z,\bar{Z})\) with \(\bar{Z}:XY - Z - \bar{Z}\), it does not hold in general that \(C_W(X;Y|\bar{Z}) \ge C_W(X;Y|Z)\).

References

  1. Maurer, U.M.: Secret key agreement by public discussion from common information. IEEE Trans. Inf. Theor. 39(3), 33–742 (1993)

    Article  Google Scholar 

  2. Maurer, U.M., Wolf, S.: Unconditionally secure key agreement and the intrinsic conditional information. IEEE Trans. Inf. Theor. 45(2), 499–514 (1999)

    Article  MathSciNet  MATH  Google Scholar 

  3. Renner, R., Wolf, S.: New bounds in secret-key agreement: the gap between formation and secrecy extraction. In: Biham, E. (ed.) Advances in Cryptology-EUROCRYPT 2003. LNCS, vol. 2656, pp. 562–577. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  4. Winter, A.: Secret, public and quantum correlation cost of triples of random variables. In: Proceedings of the IEEE International Symposium on Information Theory (ISIT 2005), pp. 2270–2274 (2005)

    Google Scholar 

  5. Chitambar, E., Hsieh, M.H., Winter, A.: The private and public correlation cost of three random variables with collaboration (2014). arXiv preprint arXiv:1411.0729

  6. Horodecki, K., Horodecki, M., Horodecki, P., Oppenheim, J.: Information theories with adversaries, intrinsic information, and entanglement. Found. Phys. 35(12), 2027–2040 (2005)

    Article  MathSciNet  MATH  Google Scholar 

  7. Gács, P., Körner, J.: Common information is far less than mutual information. Prob. Control Inf. Theor. 2(2), 149–162 (1973)

    MATH  Google Scholar 

  8. Wyner, A.D.: The common information of two dependent random variables. IEEE Trans. Inf. Theor. 21(2), 163–179 (1975)

    Article  MathSciNet  MATH  Google Scholar 

  9. Cuff, P.: Distributed channel synthesis. IEEE Trans. Inf. Theor. 59(11), 7071–7096 (2013)

    Article  MathSciNet  Google Scholar 

  10. Bennett, C.H., Devetak, I., Harrow, A.W., Shor, P.W., Winter, A.: The quantum reverse Shannon theorem and resource tradeoffs for simulating quantum channels. IEEE Trans. Inf. Theor. 60(5), 2926–2959 (2014)

    Article  MathSciNet  Google Scholar 

  11. Csiszár, I., Körner, J.: Information theory: coding theorems for discrete memoryless systems. Cambridge University Press, Cambridge (2011)

    Book  Google Scholar 

  12. Ahlswede, R., Körner, J.: On common information and related characteristics of correlated information sources. Preprint. Presented at the 7th Prague Conference on Information Theory (1974)

    Google Scholar 

  13. Christandl, M., Renner, R., Wolf, S.: A property of the intrinsic mutual information. In: Proceedings of the IEEE International Symposium on Information theory (ISIT 2003), pp. 258–258 (2003)

    Google Scholar 

  14. Christandl, M., Ekert, A., Horodecki, M., Horodecki, P., Oppenheim, J., Renner, R.S.: Unifying classical and quantum key distillation. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 456–478. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  15. Gohari, A.A., Anantharam, V.: Information-theoretic key agreement of multiple terminals-Part I. IEEE Trans. Inf. Theor. 56(8), 3973–3996 (2010)

    Article  MathSciNet  Google Scholar 

  16. Cerf, N.J., Massar, S., Schneider, S.: Multipartite classical and quantum secrecy monotones. Phys. Rev. A 66(4), 042309 (2002)

    Article  Google Scholar 

  17. Masanes, L., Acin, A.: Multipartite secret correlations and bound information. IEEE Trans. Inf. Theor. 52(10), 4686–4694 (2006)

    Article  MathSciNet  MATH  Google Scholar 

  18. Liu, R., Trappe, W. (eds.): Securing Wireless Communications at the Physical Layer. Springer, New York (2010)

    Google Scholar 

  19. Banerjee, P.K.: Synergy, redundancy, and secret common randomness: Some intriguing links. M.S. thesis, Dept. E & ECE, IIT Kharagpur, India (2014)

    Google Scholar 

Download references

Acknowledgments

PKB wishes to thank Amin Gohari for valuable comments and Paul Cuff for short useful discussions over email. This work is based in part on PKB’s master’s thesis [19] and was supported in part by the AVLSI Consortium, IIT Kharagpur.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Pradeep Kr. Banerjee .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Banerjee, P.K. (2015). A Secret Common Information Duality for Tripartite Noisy Correlations. In: Abawajy, J., Mukherjea, S., Thampi, S., Ruiz-Martínez, A. (eds) Security in Computing and Communications. SSCC 2015. Communications in Computer and Information Science, vol 536. Springer, Cham. https://doi.org/10.1007/978-3-319-22915-7_31

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-22915-7_31

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-22914-0

  • Online ISBN: 978-3-319-22915-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics