Back to Search
Start Over
Secure Key Agreement over Partially Corrupted Channels
- Source :
- ISIT
- Publication Year :
- 2018
- Publisher :
- IEEE, 2018.
-
Abstract
- Key agreement (KA) is a fundamental cryptographic primitive. Assuming that Alice and Bob do not have any prior shared correlation, it has been proved that key agreement with security against a computationally unbounded adversary is impossible if communication is either over a fully public channel, or the channel is fully controlled by the adversary. In this paper we consider a setting where communication is over a partially corrupted channel, and there is no prior shared correlation. We formalize security and reliability of key agreement protocols in this setting, derive bounds on the rate of secret key agreement, and give constructions that achieve the respective bounds. Our results show that secret key agreement, and hence secret message transmission, is possible, as long as a small fraction of the transmitted symbols in each round remain untouched by the adversary. Our results can be extended to key agreement between nodes in a network, when the two nodes are connected by a set of disjoint paths, and in each round a subset of paths is eavesdropped and another subset (possibly with overlap) is tampered with. We relate our results to previous works, and discuss future directions
- Subjects :
- Theoretical computer science
Cryptographic primitive
Computer science
Reliability (computer networking)
020206 networking & telecommunications
0102 computer and information sciences
02 engineering and technology
Disjoint sets
Adversary
01 natural sciences
Transmission (telecommunications)
Alice and Bob
010201 computation theory & mathematics
0202 electrical engineering, electronic engineering, information engineering
Key (cryptography)
Computer Science::Cryptography and Security
Communication channel
Subjects
Details
- Database :
- OpenAIRE
- Journal :
- 2018 IEEE International Symposium on Information Theory (ISIT)
- Accession number :
- edsair.doi...........32933bc5ab11cd6db945e7c669cb0c57
- Full Text :
- https://doi.org/10.1109/isit.2018.8437594