Key Distribution Protocols Based on Extractors Under the Condition of Noisy Channels in the Presence of an Active Adversary

Computer Science – Information Theory

Scientific paper

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

Scientific paper

We consider in this paper the information-theoretic secure key distribution problem over main and wire-tap noise channels with a public discussion in presence of an active adversary. In contrast to the solution proposed by ourselves for a similar problem using hashing for privacy amplification, in the current paper we use a technique of extractors. We propose modified key distribution protocols for which we prove explicit estimates of key rates without the use of estimates with uncertain coefficients in notations $O,\Omega,\Theta$. This leads in the new conclusion that the use of extractors is superior to the use of hash functions only with the very large key lengths $\ell$ (of order $\ell>10^5$ bits). We suggest hybrid key distribution protocols consisting from two consecutively executed stages. At the fist stage it is generated a short authentication key based on hash function, whereas at the second stage it is generated the final key with the use of extractors. We show that in fact the use of extraction procedure is effective only at the second stage. We get also some constructive estimates of the key rates for such protocols.

No associations

LandOfFree

Say what you really think

Search LandOfFree.com for scientists and scientific papers. Rate them and share your experience with other people.

Rating

Key Distribution Protocols Based on Extractors Under the Condition of Noisy Channels in the Presence of an Active Adversary does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.

If you have personal experience with Key Distribution Protocols Based on Extractors Under the Condition of Noisy Channels in the Presence of an Active Adversary, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Key Distribution Protocols Based on Extractors Under the Condition of Noisy Channels in the Presence of an Active Adversary will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFWR-SCP-O-58094

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.