Optimization of key distribution protocols based on extractors for noisy channels within active adversaries

  • Authors:
  • Victor Yakovlev;Valery Korzhik;Mihail Bakaev;Guillermo Morales-Luna

  • Affiliations:
  • Department of Information Security of Telecommunication Systems, State University of Telecommunication, St. Petersburg, Russia;Department of Information Security of Telecommunication Systems, State University of Telecommunication, St. Petersburg, Russia;Department of Information Security of Telecommunication Systems, State University of Telecommunication, St. Petersburg, Russia;Computer Science, Cinvestav-IPN, Mexico City, Mexico

  • Venue:
  • MMM-ACNS'12 Proceedings of the 6th international conference on Mathematical Methods, Models and Architectures for Computer Network Security: computer network security
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

We consider the information-theoretic secure key distribution problem (KDP) over noisy binary symmetric channels with public discussion and in the presence of an active adversary. There are several versions of such protocols proposed by Maurer, Wolf, Renner, Dodis, Reyzin et al. We describe two new versions of KDP for the same channel model and with the use of extractors as a mean of privacy amplification but with the goal to maximize the key rate under an optimization of the protocol parameters. There are two novelties in solution of KDP: we get the extractor's seed directly from the distributed initial strings and we prove the main results in terms of explicit estimates without the use of the uncertain symbols O, Ω, Θ. Both asymptotic and non-asymptotic cases are presented. It is shown that the extractors can be superior to conventional hashing for very large lengths of initially distributed strings.