J. Muramatsu, K. Yoshimura, Kenichi Arai, P. Davis
{"title":"Secret key agreement under sampling attack","authors":"J. Muramatsu, K. Yoshimura, Kenichi Arai, P. Davis","doi":"10.1109/ISIT.2005.1523726","DOIUrl":null,"url":null,"abstract":"This paper considers the capacity for secret key agreement under a sampling attack. Given the number of the eavesdropper's sources, we evaluate the secret key capacity bound which is defined as the supremum of the secret key capacity divided by the description length of the alphabet, where the supremum is taken over a set of probability distributions corresponding to the correlated sources. In particular, we consider symmetric sources and permutation-invariant sources. We derive inequalities which show the scaling of the secret key capacity bound with the number of the eavesdropper's sources","PeriodicalId":166130,"journal":{"name":"Proceedings. International Symposium on Information Theory, 2005. ISIT 2005.","volume":"7 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2005-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings. International Symposium on Information Theory, 2005. ISIT 2005.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISIT.2005.1523726","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
This paper considers the capacity for secret key agreement under a sampling attack. Given the number of the eavesdropper's sources, we evaluate the secret key capacity bound which is defined as the supremum of the secret key capacity divided by the description length of the alphabet, where the supremum is taken over a set of probability distributions corresponding to the correlated sources. In particular, we consider symmetric sources and permutation-invariant sources. We derive inequalities which show the scaling of the secret key capacity bound with the number of the eavesdropper's sources