Abstract
Information-theoretic secret key agreement generally consists of three phases, namely, advantage distillation information reconciliation and privacy amplification. Advantage distillation is needed in the case when two legitimate users, Alice and Bob, start in a situation which is inferior to that of the adversary Eve. The aim for them is to gain advantage over Eve in terms of mutual information between each other. Information reconciliation enables Alice and Bob to arrive at a common string by error correction techniques. Finally they distill a highly secret string from the common string in the privacy amplification phase. For the scenario where Alice and Bob as well as Eve have access to the output of a binary symmetric source by means of (three) binary symmetric channels, there are several advantage distillation and information reconciliation protocols proposed.In this paper, we present a general protocol to implement both advantage distillation and information reconciliation. Simulation results are compared with known protocols. A connection between our protocol and the known protocols is given.
Similar content being viewed by others
References
R. Ahlswede and I. Csiszár, Common randomness in information theory and cryptography—Part I: secret sharing, IEEE Trans. Inform. Theory, Vol. (IT-39), No. (4) (1993) pp. 1121–1132.
C. H. Bennett, F. Bessette, G. Brassard, L. Salvail and J. Smolin, Experimental quantum cryptography, Journal of Cryptology, Vol. (5) (1992) pp. 3–28.
C. H. Bennett, G. Brassard, C. Crépeau and U. M. Maurer, Generalized privacy amplification, IEEE Trans. Inform. Theory, Vol. (IT-41) No. (6) (1995) pp. 1915–1923.
C. H. Bennett, G. Brassard and J.-M. Robert, How to reduce your enemy's information, In 85, Lecture Notes in Comput. Sci., Vol. 218, Berlin, Germany, Springer-Verlag (1986) pp. 468–476.
G. Brassard and L. Salvail, Secret key reconciliation by public discusssion, In 93, Lecture Notes in Comput. Sci., Vol. 765 (1994) pp. 410–423.
R. Brunner, C. Cachin, U. Maurer and C. Vonäsch, Demonstration System for Secret Key Agreement by Public Discussion, http://www.inf.ethz.ch/department/TI/um/.
C. Cachin and U. Maurer, Linking information reconciliation and privacy amplification, Journal of Cryptology, Vol. (10), No. (2) (1997) pp. 97–110.
M. van Dijk, Coding gain strategies for the binary symmetric broadcast channel with confidential messages, In Proceedings of the 16th Symposium on Information Theory in the Benelux, pp. 53–60, May 18- 19, 1995.
M. van Dijk and A. Koppelaar, High rate reconciliation, In Proceedings of ISIT'97 (1997) p. 92.
M. van Dijk, Secret key sharing and secret key generation, Ph. D. Thesis, Technische Universiteit Eindhoven (1997) pp. 192–195.
M. van Dijk and H. van Tilborg, The art of distilling, In Proceedings of ITW'98 (1998) pp. 158–159.
M. J. Gander and U. M. Maurer, On the secret key rate of binary random variables, In Proceedings of ISIT 94 (1994) p. 351.
S. Liu, Information-theoretic secret key agreement, Ph. D. Thesis, Technische Universiteit Eindhoven (2002).
S. Liu and H. van Tilborg, Optimizing secret key reconciliation protocol Cascade, manuscript.
D. J. C. MacKay, Good error-correcting codes based on very sparse matrices, IEEE Trans. Inform. Theory, Vol. (IT-45), No. (2) pp. 399–431.
U. M. Maurer, The strong secret key rate of discret random triples, Communication and Cryptography—Two Sides of One Tapestry, Kluwer Academic Publishers (1994) pp. 271–285.
U. M. Maurer, Secret key agreement by public discussion from common information, IEEE Trans. Inform. Theory, Vol. (IT-39) (1993) pp. 733–742.
U. M. Maurer, Protocols for secret key agreement by public discussion based on common information, In 92, Lecture Notes in Comput. Sci., Vol. 740, Springer-Verlag (1993) pp. 461–470.
J. Pearl, Probabilistic reasoning in intelligent systems: Networks of plausible inference, Morgan Kaufmann, San Mateo (1988).
T. Sugimoto and K. Yamazaki, A study on secret key reconciliation protocol “Cascade”, Trans. of the IEICE, Vol. (E83-A), No. (10) (2000) pp. 1987–1991.
S. Wolf, Information-Theoretically and Computationally Secure Key Agreement in Cryptography, ETH dissertation No.13138, ETH Zrich (1999).
K. Yamazaki, M. Osaki and O. Hirota, On reconciliation of discrepant sequences shared through quantum mechanical channels, Lecture Notes in Computer Science, Vol. 1396, (eds. E. Okamoto, G. Davida and M. Mambo), Springer-Verlag (1998) pp. 345–356.
K. Yamazaki and T. Sugimoto, On secret reconciliation protocol—modification of “Cascade” protocol, International Symposium on Information Theory and Its applications, Honolulu, Hawaii, Nov. 5- 8 (2000) pp. 223–226.
Author information
Authors and Affiliations
Rights and permissions
About this article
Cite this article
Liu, S., Van Tilborg, H.C.A. & Van Dijk, M. A Practical Protocol for Advantage Distillation and Information Reconciliation. Designs, Codes and Cryptography 30, 39–62 (2003). https://doi.org/10.1023/A:1024755209150
Issue Date:
DOI: https://doi.org/10.1023/A:1024755209150