Key Distribution Protocol Based on Noisy Channel and Error Detecting Codes
Secret key agreement based on noisy channel connecting parties and on public discussion has been considered in 1-4 for asymptotic case. Extension of the information-theoretically secure key sharing concept to non- asymptotic case was given in . In the last paper several channel transform protocols (corresponding to different algorithms of public discussion) were presented. Unfortunately the efficiency of these protocols was very low in comparison with asymptotic key capacity found in . The reason of this was that these protocols do not use a redundancy efficiently. One of the considered protocols (the socalled advantage to the main channel primitive) exploits a repetition of binary symbols only. It may be much better to use linear error detecting codes, that is just a subject of consideration in the current paper. We regain the main formulas to compute Renyi entropy which is necessary to bound the information about the final key leaking to an eavesdropper after execution of such modificated protocol. The use of this protocol causes an increase in the key-rate by several times, that is very important in practical implementations of key sharing procedures.
KeywordsPublic Discussion Forward Error Correction Information Symbol Noisy Channel Privacy Amplification
Unable to display preview. Download preview PDF.
- 3.Maurer, U.: Protocols for Secret Key Agreement by Public Discussion Based on Common Information. Advances in Cryptology — CRYPTO’ 92, Lecture Notes in Computer Science, Vol. 740. Springer-Verlag, Berlin (1993) 461–470Google Scholar
- 5.Korjik, V., Yakovlev, V., Sinuk, A.: Performance Evaluation of different Secret Key Agreement Protocols Based on Noisy Channels. ICCI’2000, KuwaitGoogle Scholar
- 6.Scheier, B.: Applied Cryptography. J. Wiley (1994)Google Scholar
- 7.Klove, T., Korjik, V.: Error Detecting Codes. Kluwer (1995)Google Scholar
- 10.Korjik, V., Morales Luna, G, Balakirsky, V.: Enhanced Privacy Amplification Theorem for Noisy Main Channel (submitted for Crypto’2001)Google Scholar