Information-Theoretically Secure Secret-Key Agreement by NOT Authenticated Public Discussion

  • Ueli Maurer
Conference paper

DOI: 10.1007/3-540-69053-0_15

Part of the Lecture Notes in Computer Science book series (LNCS, volume 1233)
Cite this paper as:
Maurer U. (1997) Information-Theoretically Secure Secret-Key Agreement by NOT Authenticated Public Discussion. In: Fumy W. (eds) Advances in Cryptology — EUROCRYPT ’97. EUROCRYPT 1997. Lecture Notes in Computer Science, vol 1233. Springer, Berlin, Heidelberg

Abstract

All information-theoretically secure key agreement protocols (e.g. based on quantum cryptography or on noisy channels) described in the literature are secure only against passive adversaries in the sense that they assume the existence of an authenticated public channel. The goal of this paper is to investigate information-theoretic security even against active adversaries with complete control over the communication channel connecting the two parties who want to agree on a secret key. Several impossibility results are proved and some scenarios are characterized in which secret-key agreement secure against active adversaries is possible. In particular, when each of the parties, including the adversary, can observe a sequence of random variables that are correlated between the parties, the rate at which key agreement against active adversaries is possible is characterized completely: it is either 0 or equal to the rate achievable against passive adversaries, and the condition for distinguishing between the two cases is given.

Download to read the full conference paper text

Copyright information

© Springer-Verlag Berlin Heidelberg 1997

Authors and Affiliations

  • Ueli Maurer
    • 1
  1. 1.Department of Computer ScienceETH ZurichZurich

Personalised recommendations