Chapter

Advances in Cryptology — EUROCRYPT ’93

Volume 765 of the series Lecture Notes in Computer Science pp 410-423

Date:

Secret-Key Reconciliation by Public Discussion

  • Gilles BrassardAffiliated withDépartement IRO, Université de Montréal
  • , Louis SalvailAffiliated withDépartement IRO, Université de Montréal

Abstract

Assuming that Alice and Bob use a secret noisy channel (modelled by a binary symmetric channel) to send a key, reconciliation is the process of correcting errors between Alice’s and Bob’s version of the key. This is done by public discussion, which leaks some information about the secret key to an eavesdropper. We show how to construct protocols that leak a minimum amount of information. However this construction cannot be implemented efficiently. If Alice and Bob are willing to reveal an arbitrarily small amount of additional information (beyond the minimum) then they can implement polynomial-time protocols. We also present a more efficient protocol, which leaks an amount of information acceptably close to the minimum possible for sufficiently reliable secret channels (those with probability of any symbol being transmitted incorrectly as large as 15%). This work improves on earlier reconciliation approaches [R, BBR, BBBSS].