2,281,415 research outputs found
A New Key-Agreement-Protocol
A new 4-pass Key-Agreement Protocol is presented. The security of the
protocol mainly relies on the existence of a (polynomial-computable)
One-Way-Function and the supposed computational hardness of solving a specific
system of equations.Comment: 4 page
Unique Information and Secret Key Agreement
The partial information decomposition (PID) is a promising framework for
decomposing a joint random variable into the amount of influence each source
variable Xi has on a target variable Y, relative to the other sources. For two
sources, influence breaks down into the information that both X0 and X1
redundantly share with Y, what X0 uniquely shares with Y, what X1 uniquely
shares with Y, and finally what X0 and X1 synergistically share with Y.
Unfortunately, considerable disagreement has arisen as to how these four
components should be quantified. Drawing from cryptography, we consider the
secret key agreement rate as an operational method of quantifying unique
informations. Secret key agreement rate comes in several forms, depending upon
which parties are permitted to communicate. We demonstrate that three of these
four forms are inconsistent with the PID. The remaining form implies certain
interpretations as to the PID's meaning---interpretations not present in PID's
definition but that, we argue, need to be explicit. These reveal an
inconsistency between third-order connected information, two-way secret key
agreement rate, and synergy. Similar difficulties arise with a popular PID
measure in light the results here as well as from a maximum entropy viewpoint.
We close by reviewing the challenges facing the PID.Comment: 9 pages, 3 figures, 4 tables;
http://csc.ucdavis.edu/~cmg/compmech/pubs/pid_skar.htm. arXiv admin note:
text overlap with arXiv:1808.0860
Key Agreement
WPA and WPA2 (Wi-Fi Protected Access) is a certification program developed by the Wi-Fi Alliance to indicate compliance with the security protocol created by the WiFi alliance to secure wireless networks. The alliance defined the protocol in response to several weaknesses researchers had found in the previous Wired Equivalent Privacy (WEP) system. Many sophisticated authentication and encryption techniques have been embedded into WPA but it is still facing a lot of challenging situations. In this paper we discuss the vulnerabilit
Stronger Attacks on Causality-Based Key Agreement
Remarkably, it has been shown that in principle, security proofs for quantum
key-distribution (QKD) protocols can be independent of assumptions on the
devices used and even of the fact that the adversary is limited by quantum
theory. All that is required instead is the absence of any hidden information
flow between the laboratories, a condition that can be enforced either by
shielding or by space-time causality. All known schemes for such Causal Key
Distribution (CKD) that offer noise-tolerance (and, hence, must use privacy
amplification as a crucial step) require multiple devices carrying out
measurements in parallel on each end of the protocol, where the number of
devices grows with the desired level of security. We investigate the power of
the adversary for more practical schemes, where both parties each use a single
device carrying out measurements consecutively. We provide a novel construction
of attacks that is strictly more powerful than the best known attacks and has
the potential to decide the question whether such practical CKD schemes are
possible in the negative
Secret Key Agreement under Discussion Rate Constraints
For the multiterminal secret key agreement problem, new single-letter lower
bounds are obtained on the public discussion rate required to achieve any given
secret key rate below the secrecy capacity. The results apply to general source
model without helpers or wiretapper's side information but can be strengthened
for hypergraphical sources. In particular, for the pairwise independent
network, the results give rise to a complete characterization of the maximum
secret key rate achievable under a constraint on the total discussion rate
Low-power Secret-key Agreement over OFDM
Information-theoretic secret-key agreement is perhaps the most practically
feasible mechanism that provides unconditional security at the physical layer
to date. In this paper, we consider the problem of secret-key agreement by
sharing randomness at low power over an orthogonal frequency division
multiplexing (OFDM) link, in the presence of an eavesdropper. The low power
assumption greatly simplifies the design of the randomness sharing scheme, even
in a fading channel scenario. We assess the performance of the proposed system
in terms of secrecy key rate and show that a practical approach to key sharing
is obtained by using low-density parity check (LDPC) codes for information
reconciliation. Numerical results confirm the merits of the proposed approach
as a feasible and practical solution. Moreover, the outage formulation allows
to implement secret-key agreement even when only statistical knowledge of the
eavesdropper channel is available.Comment: 9 pages, 4 figures; this is the authors prepared version of the paper
with the same name accepted for HotWiSec 2013, the Second ACM Workshop on Hot
Topics on Wireless Network Security and Privacy, Budapest, Hungary 17-19
April 201
Orthogonal-state-based protocols of quantum key agreement
Two orthogonal-state-based protocols of quantum key agreement (QKA) are
proposed. The first protocol of QKA proposed here is designed for two-party
QKA, whereas the second protocol is designed for multi-party QKA. Security of
these orthogonal-state-based protocols arise from monogamy of entanglement.
This is in contrast to the existing protocols of QKA where security arises from
the use of non-orthogonal state (non-commutativity principle). Further, it is
shown that all the quantum systems that are useful for implementation of
quantum dialogue and most of the protocols of secure direct quantum
communication can be modified to implement protocols of QKA.Comment: 9 pages, no figur
- …