Characterization of optimal key set protocols

  • Authors:
  • Takaaki Mizuki;Hiroki Shizuya;Takao Nishizeki

  • Affiliations:
  • Information Synergy Center, Tohoku University, Aoba-yama 05, Aoba-ku, Sendai 980-8579, Japan;Information Synergy Center, Tohoku University, Kawauchi, Aoba-ku, Sendai 980-8578, Japan;Graduate School of Information Sciences, Tohoku University, Aoba-yama 05, Aoba-ku, Sendai 980-8579, Japan

  • Venue:
  • Discrete Applied Mathematics
  • Year:
  • 2003

Quantified Score

Hi-index 0.04

Visualization

Abstract

Using a random deal of cards to players and a computationally unlimited eavesdropper, all players wish to share a common one-bit secret key which is information-theoretically secure from the eavesdropper. This can be done by the so-called key set protocols. In this paper, we give a necessary and sufficient condition for a key set protocol to be ''optimal'', that is, to succeed always in sharing a one-bit secret key.