Converses For Secret Key Agreement and Secure Computing


Autoria(s): Tyagi, Himanshu; Watanabe, Shun
Data(s)

2015

Resumo

We consider information theoretic secret key (SK) agreement and secure function computation by multiple parties observing correlated data, with access to an interactive public communication channel. Our main result is an upper bound on the SK length, which is derived using a reduction of binary hypothesis testing to multiparty SK agreement. Building on this basic result, we derive new converses for multiparty SK agreement. Furthermore, we derive converse results for the oblivious transfer problem and the bit commitment problem by relating them to SK agreement. Finally, we derive a necessary condition for the feasibility of secure computation by trusted parties that seek to compute a function of their collective data, using an interactive public communication that by itself does not give away the value of the function. In many cases, we strengthen and improve upon previously known converse bounds. Our results are single-shot and use only the given joint distribution of the correlated observations. For the case when the correlated observations consist of independent and identically distributed (in time) sequences, we derive strong versions of previously known converses.

Formato

application/pdf

Identificador

http://eprints.iisc.ernet.in/52387/1/IEEE_Tra_on_Inf_The_61-9_4809_2015.pdf

Tyagi, Himanshu and Watanabe, Shun (2015) Converses For Secret Key Agreement and Secure Computing. In: IEEE TRANSACTIONS ON INFORMATION THEORY, 61 (9). pp. 4809-4827.

Publicador

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC

Relação

http://dx.doi.org/10.1109/TIT.2015.2457926

http://eprints.iisc.ernet.in/52387/

Palavras-Chave #Electrical Communication Engineering
Tipo

Journal Article

PeerReviewed