Multiple Private Key Generation for Continuous Memoryless Sources with A Helper
Abstract
We propose a method to study the secrecy constraints in key generation problems where side information might be present at untrusted users. Our method is inspired by a recent work of Hayashi and Tan who used the Rényi divergence as the secrecy measure to study the output statistics of applying hash functions to a random sequence. By generalizing the achievability result of Hayashi and Tan to the multi-terminal case, we obtain the output statistics of applying hash functions to multiple random sequences, which turn out to be an important tool in the achievability proof of strong secrecy capacity regions of key generation problems with side information at untrusted users. To illustrate the power of our method, we derive the capacity region of the multiple private key generation problem with an untrusted helper for continuous memoryless sources under Markov conditions. The converse proof of our result follows by generalizing a result of Nitinawarat and Narayan to the case with side information at untrusted users.
I Introduction
The problem of generating a secret key for two parties observing correlated random variables was first considered by Maurer [1] and by Ahlswede and Csiszár [2]. In [1, 2], there are two legitimate users Alice and Bob as well as an eavesdropper Eve. Alice observes a source sequence , Bob observes and Eve observes . It is assumed that there exists noiseless public channel over which Alice and Bob can talk interactively in rounds. The eavesdropper, although not allowed to talk, can overhear the messages transmitted over the public channel. Under the condition that forms a Markov chain, it is shown that the secret key capacity (maximal rate of the secret key) is for discrete memoryless sources (DMS).
Subsequently in [3], Csiszár and Narayan extended the model in [1, 2] by adding a third party called a helper which assists the legitimate users to generate a secret key. Furthermore, the authors in [4] generalized the result in [3] to a setting with at least four terminals. It is assumed in [4] that there exist an eavesdropper Eve and other terminals denoted by . For each , terminal observes a source sequence , which is correlated with all other source sequences . The eavesdropper observes a correlated source sequence . Let and denote two disjoint group of users, i.e., . All users in aim to generate a common key with the help of all other users in . Interactive communication with unlimited rate is assumed and the overall communication over the public channel is denoted as . The authors in [4] considered three problems depending the security constraint on the key. If the key is only concealed from the public messages , the problem is a secret key generation problem. If the key is concealed from both the public messages and the source sequences observed by users , then the problem is a private key generation problem. If the key is concealed from both the public messages and the source sequence observed by the eavesdropper, the problem is considered as a wiretap key generation problem. Using results in the distributed source coding [5, Theorem 3.1.14], Csiszár and Narayan [4] characterizes the exact capacity for the secret key and private key generation problems as well as bounds on the wiretap key capacity. Furthermore, the authors proved an upper bound on the secret key capacity and conjectured the upper bound is tight in general. The conjecture was solved partially by Ye and Reznik [6] and proved to be true by Chan and Zheng [7]. Other works on the secret key generation include [8, 9, 10, 11, 12, 13, 14, 15].
The problem of generating multiple keys was initialized by Ye and Narayan in [16] where they considered the generation of a private key and a secret key with three terminals. The authors proved an outer bound on the capacity region which was later shown to be tight by Zhang et al. [17]. Furthermore, in [18], the authors considered generating two keys in a cellular model and derived the capacity region for four cases depending on the security constraints on the keys. Other works on the multiple key generation problem include [19, 20, 21]. In terms of key generation problems for correlated Gaussian memoryless sources (GMS), Nitinawarat and Narayan [22] derived the capacity for secret key generation with multi-terminals and thus extended [4, Theorem 2] to GMS. Watanabe and Oohama derived the capacity for secret key generation for GMS and vector GMS under rate-limited public communication in [23] and [24] respectively. Other works on secret key generation for GMS include [25, 26, 27].
In this paper, we are interested in the private key generation problem for correlated continuous memoryless sources (CMS) with a helper and unlimited public discussion. To the best of our knowledge, the private key generation problem for CMS remains unexplored.
The main challenges of private key generation problems for CMS lie in the analysis of the secrecy constraints in the achievability part since we need to upper bound the term where is the private key, is the public message and is an continuous i.i.d. sequence observed by some untrusted helpers. To bound , existing works, e.g., [26, 27, 15], applied quantization to the continuous side information and relied heavily on the continuity of information quantities. The analyses are usually tedious.
In contrast, inspired by [11] and [28], we analyze the secrecy part in the private key generation problem for CMS by studying the output statistics of hash functions (random binning) under the Rényi divergence measure and using the fact that the Rényi divergence is non-decreasing in the order [29]. The great advantage of our proposed method is that it is a unified and neat method which holds for the case with either continuous, discrete or no side information at untrusted users. We believe that our result in Lemma 1 can be used to significantly simplify the security analysis for secret key generation problems when the eavesdropper has access to continuous (e.g., Gaussian) side information which are correlated to the observations at legitimate users (e.g., [26, 27, 15]). Furthermore, our proposed method can be used to derive bounds on the convergence speed of secrecy constraints beyond the fact that secrecy constraints vanish under certain rate constraints. See the remark after Theorem 2 for further discussion.
I-A Main Contributions
Our main contributions are summarized as follows.
Firstly, we derive the output statistics of applying hash functions to multiple random sequences under the Rényi divergence measure in Lemma 1. Lemma 1 is an extension of [11, Theorem 1] to a multi-terminal case and a strict generalization of [30, Theorem 1] where the output statistics of random binning under the total variational distance measure was derived. Furthermore, Lemma 1 turns out to be an important tool in analyzing secrecy constraints in key generation problems, especially when the key needs to be protected from continuous observations correlated to observations at legitimate users.
Secondly, to illustrate the power of Lemma 1, we derive the capacity region for the multiple private key generation problem with a helper for CMS. To be specific, we revisit the model in [18] and derive the capacity region for CMS under a symmetric security requirement which did not appear in [18]. The converse proof follows by judiciously adapting the techniques in [22, Theorem 1] to our setting. In the achievability proof, we use Lemma 1 to analyze the secrecy constraints on generated keys which need to be protected from correlated continuous observations of illegitimate users. Furthermore, we use the quantization techniques in [22], the large deviations analysis for distributed source coding in [31], the Fourier Motzkin Elimination and the techniques to bound the difference between the differential entropy of CMS and the discrete entropy of the quantized random variables. We remark that the techniques used in our paper can also apply to strengthen all the four cases in [18] with strong secrecy and for CMS. Furthermore, we also extend our result to a cellular model involving more than four terminals and derive inner and outer bounds for the capacity region.
I-B Organization of the Paper
The rest of the paper is organized as follows. In Section I, we set up the notation. In Section II, we formulate the problem of output statistics of hash functions and present our main result under the Rényi divergence measure in Lemma 1. Subsequently in Section III, invoking Lemma 1, we derive the capacity region for the multiple private key generation problem with a helper. Furthermore, we generalize our result to a cellular model and derive bounds on the capacity region. The proofs of the capacity region for the multiple private key generation with a helper are given Sections IV and V. Finally, we conclude our paper and discuss future research directions in Section VI. For the smooth presentation of our main results, the proofs of all supporting lemmas are deferred to the appendices.
Notation
Throughout the paper, random variables and their realizations are in capital (e.g., ) and lower case (e.g., ) respectively. All sets are denoted in calligraphic font (e.g., ). We use to denote the complement of and use to denote the uniform distribution over . Given any two integers , we use to denote the set of all integers between and and we use to denote for any integer . Let . Given a sequence of random variables and any subset , we use and interchangeably. Furthermore, let be a random vector of length . For any , we use and interchangeably. For information theoretical quantities, we follow [32].
II Output Statistics of Hash Functions
In this subsection, we consider hash functions and study its output statistics under the Rényi divergence measure. The result in this section (cf. Lemma 1) serves as an important tool in the subsequent analysis for key generation problems.
II-A Preliminary
Before presenting the main result, we first introduce some definitions. Given two distributions defined an alphabet , the KL divergence is defines as
(1) |
Furthermore, given , the Rényi divergence or order is defined as
(4) |
It is well known that is non-decreasing in (cf. [29]) and thus for all .
Given a joint distribution on the alphabet , the conditional entropy is defined as
(5) |
Furthermore, given , the conditional Rényi entropy of order is defined as
(8) |
and the Gallager’s conditional Rényi entropy of order is defined as
(9) |
We remark that for continuous random variables, the summations in (4), (8), (9) should be replaced by integrals.
Definition 1.
Given an arbitrary set and the set , a random hash function is a stochastic mapping from to , where denotes the random variable describing the stochastic behavior of the hash function. Given any , an ensemble of random hash functions is called an -almost universal2 hash function if it satisfies that for any distinct , we have
(10) |
When , we say that the ensemble of functions is a universal2 hash function.
We remark that random binning in source coding problems (e.g., [32, Chapter 15.4.1]) is a universal2 hash function.
II-B Output Statistics
In this subsection, we study the output statistic of applying hash functions to multiple random sequences under the Rényi divergence measure. For simplicity, we use to denote the set . Consider a sequence of random variables with a joint distribution defined on an alphabet where all , the alphabet is finite. Let be an i.i.d sequence generated according to the distribution .
For each , let be an -almost universal2 hash function mapping from to where describes the stochastic behavior of the hash function. Furthermore, the rate of the hash function is defined as . We are interested in the output statistics of applying hash functions to the random sequences , i.e., .
For ease of notation, let for each . Furthermore, for each , let denote the uniform distribution over and let denotes the induced output distribution by and the hash function , i.e., for all ,
(11) |
To quantify the output statistics of the hash functions, it is common to use the KL divergence as a measure where
(12) | ||||
(13) |
Note that if for some , then we have the following results
-
(i)
is small, indicating that the output of hash functions and are almost independent for all distinct pairs ;
-
(ii)
is small, indicating that the output of each hash function is almost uniform over for all ;
-
(iii)
is small, indicating that the collection of outputs of hash functions is almost independent of the side information .
In this subsection, instead of using (13), we make use of the Rényi divergence of order (cf. (4)) as the measure of output statistics of hash functions, i.e.,
(14) | ||||
(15) |
where (15) follows from (8). Note that the measure in (15) is a strict generalization of that in (13).
Our results in the following lemma concern the output statistics of -almost universal2 hash functions for any unless otherwise stated.
Lemma 1.
The following claims hold.
-
(i)
For any
(16) -
(ii)
For any , if for all non-empty subset of ,
(17) then
(18) -
(iii)
When , for any
(19)
Note that the asymptotic performance in Claim (iii) is achieved only by (-almost) universal2 hash functions since we put the additional constraint of . This condition could potentially be relaxed with techniques in [36].
The proof of Lemma 1 is inspired by [11, Theorem 1], [28, Lemma 1 and Theorem 2] and provided in Appendix -A. A few remarks are in order.
Firstly, Lemma 1 is a generalization of [11, Theorem 1] to multi-terminal. In the proof of Lemma 1, we also borrow an idea from [30, Theorem 1] which studied the output statistics of universal2 hash functions under the total variation distance measure instead of the Rényi divergence considered here. Invoking (21) and Pinsker’s inequality, it is easy to see that that [30, Theorem 1] is indeed a corollary of Lemma 1.
Secondly, since the Rényi divergence is a non-decreasing and thus for all ,
(20) | ||||
(21) |
Thus, our results in Lemma 1 can be used to analyze the secrecy constraints in key generation problems if the constraints are expressed in terms of KL divergences or mutual information terms as in existing literature.
It is not apparent how one can use Lemma 1 for this purpose. To illustrate this, in the following, we briefly discuss the case in a private key generation problem involving three terminals: two legitimate users Alice and Bob, observing sequences and respectively, and one illegitimate user Eve who has access to side information . Let denote the public communication between Alice and Bob and let denote the secret key generated by them. To make sure the generated key is secure, we need to be small and to make sure the generated key is uniform, we need to make to be small where is the uniform distribution over the alphabet of the secret key.
Note that in key generation problems, in the achievability part, the public communication is usually the random binning of observations at legitimate users and the secret key is usually obtained by applying a hash function on a commonly agreed binning sequence (which is correlated with ). Thus, we have that
(22) | ||||
(23) |
where is the uniform distribution over the alphabet of random binning.
In the remaining of this paper, to illustrate in detail how the result in Lemma 1 can be used in analyses of secrecy constraints, we consider a multiple private key generation problem and derive the capacity region for the problem under mild conditions.
III Private Key Capacity Region for CMS
III-A Multiple Private Key Generation with a Helper
Let be a joint probability density function (pdf) of random variables defined on a continuous alphabet . We assume that the pdf satisfies that for any non-empty set , the (joint) differential entropy is finite, i.e.,
(24) |
Let be a sequence of continuous random variables generated i.i.d. according to a pdf .
In this subsection, we revisit the multiple key generation model [18] by studied Zhang et al. as shown in Figure 1. In this model, there are four terminals: Alice has access to , Bob has access to , Charlie has access to and Helen has access to . It is assumed that there is a noiseless public channel and all terminals talk interactively in rounds. Let the overall messages transmitted over the public channel be . For , is a function of and previous messages where .
Let the alphabet of secret keys be for . Using the public messages and the source sequence , Alice generates a private key . Using , Bob generates private keys . Using , Charlie generates . We require that Alice and Bob agree on a private private key while Charlie and Bob agree on another private key, i.e. and . A private key generation protocol consists of the public communication . Note that in the above model, Helen is an untrusted helper who helps other terminals by transmitting messages over the public channel so that other terminals can obtain common sequences for subsequent key generations.
In [18], the authors considered four models with different secrecy requirements for discrete memoryless sources, depending on whether is known by Helen and whether is known by Alice. Our setting differs from [18] in the following two aspects:
-
(i)
We consider different secrecy requirements on generated keys. To be specific, we require the private key is only known by Alice and Bob and the private key is only known by Bob and Charlie.
-
(ii)
We consider continuous memoryless sources, which requires different techniques in the analyses and derivation of fundamental limits concerning the performance of optimal protocols.
We then give a formal definition of the capacity region of multiple private key generation with a helper, which concerns the asymptotic fundamental limits of optimal protocols.
Definition 2.
A pair is said to be an achievable private key rate pair if there exists a sequence of private key generation protocols such that
(25) | ||||
(26) | ||||
(27) | ||||
(28) |
The closure of all achievable private key rate pairs is called the private key capacity region and denoted as .
Note that (26), (27) imply that i) the generated key is almost uniform over and independent of and ii) is almost uniform over and independent of . Furthermore, the secrecy requirements in (26), (27) are strong in contrast to the weak ones in [18].
To present our result, we need the following definition. Let be the set of pairs such that
(29) | ||||
(30) | ||||
(31) |
where the mutual information is calculated with respect to the pdf or its induced pdfs.
Theorem 2.
The secrecy capacity region with an untrusted helper satisfies that
(32) |
The proof of Theorem 2 is given in Section IV. In the achievability proof, we first quantize the continuous source sequence similarly as in the proof of [22, Theorem 1]. Then, the terminals communicate over the public channel so that the quantized version of are decoded almost surely by Bob who observes . The reliability analysis (cf. (25)) for key agreement proceeds similarly as the error exponent analysis for Slepian-Wolf coding introduced in [31]. The secrecy analysis (cf. (26), (26)) follows by invoking (19) in Lemma 1. Subsequently, we need to apply Fourier Motzkin Elimination to obtain the conditions on achievable rate pairs. Finally, as the quantization level goes to infinity, we show that any rate pair inside is achievable by exploring the relationship between the differential entropy of continuous random variables and the discrete entropy of the quantized random variables.
We remark that Theorem 2 holds also for DMS, as can be gleaned from the proof. Furthermore, we can derive the achievable reliability-secrecy exponent which is positive for rate pairs inside . We remark that Lemma 1, especially Eq. (19), is critical to derive secrecy exponents [11, 12] for key generation problems of DMS. This means that, we can not only show that Eq. (26) and Eq. (27) hold, but also derive a lower bound on the speed at which the secrecy constraints in Eq. (26) and Eq. (27) vanish to zero exponentially as the length of observed sequences tends to infinity. This is yet another advantage of our method beyond quantization based techniques in [15] which could only be used to show that secrecy constraints vanish to zero but not the manner or the rate of decay.
Corollary 3.
For any pdf such that the Markov chain holds, we have that .
The proof of Corollary 3 is given in Section V. When the Markov chain holds, we have . The achievability part follows from Theorem 2 and the converse part follows by judiciously adapting the converse techniques in [22] to our setting. We remark that the proof techniques used to prove Theorem 2 and Corollary 3 can also be applied to all the four models in [18] and thus show that the capacity results in [18] also hold for CMS with strong secrecy.
III-B Generalization to a Cellular Model
Recall that . For each , define an alphabet of keys as . Let be distributed according to a joint pdf with zero mean vector and covariance matrix . In this subsection, we consider a cellular model where there is a base station and terminals. This model is a generalization of our setting in Section III-A in the spirit of [4] and has potential applications in internet of things where multiple terminals need to generate private keys with the help of other (potentially untrusted) terminals.
The base station observes the source sequence and for , terminal observes the source sequence . Fix arbitrary subset of . For each , terminal aims to generate a private key with the base station, concealed from all other terminals. We assume that the public communication is done in rounds over a noiseless public channel which is accessed by all terminals. Let denote the overall communication over the public channel. For each , given and , terminal generates a private key . Furthermore, given and , the base station generates a sequence of private keys . The goal of a good protocol is to enable the base station and each terminal to generate an agreed private key, which is concealed from all other terminals.
The capacity region for this cellular model is defined as follows.
Definition 3.
A tuple is said to an achievable private key rate tuple if there exists a sequence of private key generation protocols () such that for each ,
(33) | ||||
(34) | ||||
(35) |
The closure of the set of all achievable private key rate tuples is called the private key capacity region and denoted as .
Before presenting the main results, we need the following definitions. Note that for , .
(36) | ||||
(37) |
Theorem 4.
The private key capacity region in the Cellular model satisfies that
(38) |
The proof of Theorem 4 is omitted since it is a generalization of the proofs of Theorem 2 and Corollary 3. In fact, we can recover the result in 2 and Corollary 3 by letting and .
Here we provide only the proof sketch. In the achievability proof, we need to first quantize the source sequence at each terminal and thus obtain . Then, for , terminal sends a message over the public channel and generates a private key using . For , terminal sends the complete quantized source sequence. Thus, the public message . Given and , the base station estimates and generate private key using and the estimated sequences for all . The error probability in key agreement is derived by using the distributed source coding idea and the secrecy analysis is done by invoking (19) in Lemma 1. Let be the rate of the message at terminal and let the quantization interval go to zero. To satisfy (33) and (34), we conclude that the rates should satisfy that for any positive ,
(39) | ||||
(40) |
for each and for each non-empty subset of . Without loss of generality, we can assume that . By applying the Fourier Motzkin Elimination successively to eliminate for all , we conclude that any is achievable.
The converse proof proceeds similarly as Corollary 3 by assuming that there exists a super terminal observing and generating secret keys for each non-empty subset of . This is possible since is finite and (34) implies that for any non-empty subset of , we have that for any positive and sufficiently large ,
(41) | ||||
(42) |
IV Proof of Theorem 2
Throughout this section, we set .
IV-A Coding Strategy
Fix an integer . Let be a quantization function with quantization level such that if or and if . Note that the quantized random variable has a finite alphabet with the size . Applying the quantization function on all to obtain quantized version . We first quantize the sequences using the function and obtain corresponding quantized sequences for .
Let be a sequence of independent random variables. Let be an universal2 random hash function mapping from to for where describes the stochastic behavior of the hash function. Similarly, let be random hash function mapping from to for . Furthermore, for any positive , let for and for .
Codebook Generation: The code book generated by Alice is . The codebook generated by Charlie is . The codebook generated by Helen is . The random codebook controlled by random variables is assumed to be known by all users Alice, Bob, Charlie and Helen.
Encoding: Recall that for . Given , Alice sends over the public channel and takes as the private key . Given , Charlie sends and takes as the private key . Given , Helen sends over the public channel.
Decoding: Let be induced by and the quantization function . Given the messages transmitted over the public discussion channel and the source sequence , Bob uses maximum likelihood decoding to obtain , i.e.,
(43) |
Then, Bob claims that and .
IV-B Analysis of Error Probability in Key Agreement
Given the above coding strategy, we obtain that
(44) |
Note that the average is not only over all possible realizations of source sequences but also over all possible random universal2 hash functions. Recall that in this section and all the quantized random variable have the same alphabet . Given and , define the error events:
(45) |
IV-C Analysis of Secrecy Requirement
Recall that is the uniform distribution over for and let be the uniform distribution over for . In the following, for simplicity, we will use to denote for . Given the coding strategy, we have
(53) | ||||
(54) | ||||
(55) | ||||
(56) |
where (55) holds because is a function of and is a function of , thus
(57) | ||||
(58) | ||||
(59) |
(56) holds because
(60) | |||
(61) | |||
(62) |
IV-D Analysis of Capacity Region
Lemma 5.
The proof of Lemma 5 follows from the properties of Rényi conditional entropy and thus omitted. By applying Fourier Motzkin Elimination to (65) to (67), we obtain that should satisfy that
(71) | ||||
(72) | ||||
(73) |
Recall that is the quantization interval. Similarly as [22, Lemma 3.1] (see also [32, Theorem 8.3.1]), we obtain the following result.
Lemma 6.
(74) | |||
(75) | |||
(76) |
Invoking Lemma 6 and letting , we have shown that average over all the random codebooks controlled by random variables , if , then (25), (26) and (27) are satisfied and thus is an achievable private key rate pair. The argument that there exists a deterministic codebook satisfying (25), (26) and (27) can be done similarly as [12] and thus omitted.
V Proof of Corollary 3
V-A Preliminaries
Lemma 7.
Fix an integer . Let be a random variable jointly distributed with .
-
(i)
For any , we have
(80) -
(ii)
For any , let be a function of , then for any ,
(81)
V-B Converse Proof
Fix any secret key protocol with public message such that (25) to (28) are satisfied. We first consider keys and only to derive an upper bound for . Invoking (25) to (28), we have that for sufficiently large and any positive ,
(82) | ||||
(83) | ||||
(84) |
Recall that are the total communication of and is a function of and where . Let and . Set , , , and . Thus, . Invoking (77) to (79), we obtain that
(85) |
Invoking (81) with and and noting that the summation of mutual information terms are non-negative, we obtain that
(86) | ||||
(87) | ||||
(88) | ||||
(89) |
where (87) follows by invoking (81) with and ; (88) follows by invoking (81) for times successively; (89) follows because
(90) | ||||
(91) | ||||
(92) | ||||
(93) |
and
(94) |
where (90) follows since is a function of and ; (91) follow since is a function of and (93) follows by using the same idea successively for times.
Note that is a function of and . Continuing from (89) and invoking (81) in Lemma 7 with , , , we obtain that
(95) | |||
(96) | |||
(97) | |||
(98) | |||
(99) | |||
(100) |
where (96) follows from (80) in Lemma 7 by setting ; (97) follows from the settings , , , and ; (99) follows since is the function of and ; (100) follow by noting that and using (83).
Therefore, invoking (89) and (100), we conclude that
(101) | ||||
(102) | ||||
(103) |
Similarly as (103), by considering the generation of and only, we obtain that
(104) |
VI Conclusion
We first presented the output statistics of hash functions under the Rényi divergence criterion in Lemma 1. Lemma 1 is a generalization of the result in [11] to the multi terminal case and the strict generalization of the output statistics in [30, Theorem 1] where the variation distance is used as the security measure. Subsequently, we illustrated the power of Lemma 1 in analyzing secrecy constraints by deriving the capacity region of the multiple private key generation problem with a helper for CMS. The converse proof follows by judiciously adapting the techniques in [22] to the case with correlated side information at untrusted terminals.
We then briefly discuss the future research directions. First, one can apply Lemma 1 to analyze secrecy constraints for other key generation problems for CMS, such as the multi-terminal private key generation problem [4, Theorem 2] and the secret-private key generation problem with three terminals [16]. Furthermore, as shown in Theorems 2, 4 and Corollary 3, the capacity region for multiple private key generation is not tight in general. One may nail down the exact capacity region. Second, one may derive second-order asymptotics for multi-terminal key generation problems and thus extend the results of [9]. In order to do so, for private key generation problems, one can potentially refer to [7, 8] to derive the converse part and extend the achievability scheme in [9] to the multi-terminal case. Note that in [8, 9], the secrecy measure is the variational distance. Finally, one can explore the fundamental limits of the key generation problems with Rényi divergence as the security measure, as proposed in [28]. For capacity results, the achievability part can probably be done by using Lemma 1 or extending the results in [28].
-A Proof of Lemma 1
For simplicity, we consider and discrete variable (i.e., is finite). The case for continuous variable and for any can be done similarly by replacing the summation over with corresponding integrals and using the i.i.d. nature of source sequences. For simplicity, we use to denote , to denote and to denote for all and . Given , for any subset of , define
(119) |
Thus, we have
(120) |
-A1 Proof of Claim (i)
Fix and . For any non-empty set , we have that
(121) |
where (121) follows from the -almost universal property of hash functions for all . Similarly, if , then we have
(122) |
-A2 Proof of Claim (ii)
Recall that
(136) |
Given any and any , we have
(137) | ||||
(138) | ||||
(139) |
where (137) follows since due to the convexity of in ; (138) follows from the result in (135) and the fact that are a sequence of i.i.d. random variables, leading to ; (139) follows since i) is increasing in and ii) for any , with , if , then
(140) |
and if , then
(141) |
The proof of Claim (ii) is completed by invoking (139).
-B Proof of Claim (iii)
We then proceed to prove (19). From now on, we take and thus consider universal2 hash functions. For any and , using (135), we obtain that
(142) | ||||
(143) | ||||
(144) | ||||
(145) | ||||
(146) |
Thus, invoking (146), we obtain that for , we have
(147) |
Invoking (139), we obtain that Thus, recalling that is non-decreasing in , we obtain that for ,
(148) | ||||
(149) |
-C Proof of Lemma 6
Here we only provide the proof of (74) since (75) and (76) can be proved similarly. Recall that for , is the quantized version of , i.e., . Define an auxiliary random variable . Then we have that
(150) | ||||
(151) | ||||
(152) |
where (151) follows since is function of and is a function of for . Note that and form Markov chains. Hence, for any ,
(153) | ||||
(154) |
Thus, is non-zero if and only if for and for . Let
(155) |
Thus,
(156) | |||
(157) | |||
(158) | |||
(159) |
where (158) follows from the mean value theorem, which states that for some such that ,
(160) | ||||
(161) |
Let be the variance of . Similarly as [22, (66)-(67)], we obtain that as , for any
(162) | ||||
(163) | ||||
(164) | ||||
(165) |
Let be the binary entropy function for . Invoking (165), we obtain that
(166) | ||||
(167) |
Therefore, invoking (152), (167), (170), we obtain that
(171) |
The proof of (74) is complete if we show that
(172) |
For this purpose, define and . Then, we have
(173) | ||||
(174) | ||||
(175) |
Similarly as [22, Equation (67)], we can show that for ,
(176) |
Hence, we obtain that
(177) | ||||
(178) |
Furthermore, invoking [22, Equation (18)], we conclude that
(179) | ||||
(180) | ||||
(181) |
The proof of (172) is complete by invoking (175) and (177) to (181).
References
- [1] U. M. Maurer, “Secret key agreement by public discussion from common information,” IEEE Trans. Inf. Theory, vol. 39, no. 3, pp. 733–742, 1993.
- [2] R. Ahlswede and I. Csiszar, “Common randomness in information theory and cryptography. i. secret sharing,” IEEE Trans. Inf. Theory, vol. 39, no. 4, pp. 1121–1132, 1993.
- [3] I. Csiszar and P. Narayan, “Common randomness and secret key generation with a helper,” IEEE Trans. Inf. Theory, vol. 46, no. 2, pp. 344–366, 2000.
- [4] ——, “Secrecy capacities for multiple terminals,” IEEE Trans. Inf. Theory, vol. 50, no. 12, pp. 3047–3061, 2004.
- [5] I. Csiszár and J. Körner, Information Theory: Coding Theorems for Discrete Memoryless Systems. Cambridge University Press, 2011.
- [6] C. Ye and A. Reznik, “Group secret key generation algorithms,” in IEEE ISIT, 2007, pp. 2596–2600.
- [7] C. Chan and L. Zheng, “Mutual dependence for secret key agreement,” in CISS, 2010, pp. 1–6.
- [8] H. Tyagi and S. Watanabe, “Converses for secret key agreement and secure computing,” IEEE Trans. Inf. Theory, vol. 61, no. 9, pp. 4809–4827, 2015.
- [9] M. Hayashi, H. Tyagi, and S. Watanabe, “Secret key agreement: General capacity and second-order asymptotics,” IEEE Trans. Inf. Theory, vol. 62, no. 7, pp. 3796–3810, 2016.
- [10] I. Csiszar and P. Narayan, “Secrecy capacities for multiterminal channel models,” IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2437–2452, 2008.
- [11] M. Hayashi, “Exponential decreasing rate of leaked information in universal random privacy amplification,” IEEE Trans. Inf. Theory, vol. 57, no. 6, pp. 3989–4001, June 2011.
- [12] T. H. Chou, V. Y. F. Tan, and S. C. Draper, “The sender-excited secret key agreement model: Capacity, reliability, and secrecy exponents,” IEEE Trans. Inf. Theory, vol. 61, no. 1, pp. 609–627, Jan 2015.
- [13] A. Khisti, S. N. Diggavi, and G. W. Wornell, “Secret-key agreement with channel state information at the transmitter,” IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 672–681, 2011.
- [14] M. Bloch and J. Barros, Physical-layer security: from information theory to security engineering. Cambridge University Press, 2011.
- [15] R. A. Chou and M. R. Bloch, “Separation of reliability and secrecy in rate-limited secret-key generation,” IEEE Trans. Inf. Theory, vol. 60, no. 8, pp. 4941–4957, 2014.
- [16] C. Ye and P. Narayan, “The secret key private key capacity region for three terminals,” in IEEE ISIT, 2005, pp. 2142–2146.
- [17] H. Zhang, L. Lai, Y. Liang, and H. Wang, “The capacity region of the source-type model for secret key and private key generation,” IEEE Trans. Inf. Theory, vol. 60, no. 10, pp. 6389–6398, 2014.
- [18] H. Zhang, Y. Liang, L. Lai, and S. S. Shitz, “Multi-key generation over a cellular model with a helper,” IEEE Trans. Inf. Theory, vol. 63, no. 6, pp. 3804–3822, 2017.
- [19] W. Tu, M. Goldenbaum, L. Lai, and H. V. Poor, “On simultaneously generating multiple keys in a joint source-channel model,” IEEE Trans. Inf. Forensics Security, vol. 12, no. 2, pp. 298–308, 2017.
- [20] C. Ye and P. Narayan, “Secret key and private key constructions for simple multiterminal source models,” IEEE Trans. Inf. Theory, vol. 58, no. 2, pp. 639–651, 2012.
- [21] P. Xu, Z. Ding, X. Dai, and G. K. Karagiannidis, “Simultaneously generating secret and private keys in a cooperative pairwise-independent network,” IEEE Trans. Inf. Forensics Security, vol. 11, no. 6, pp. 1139–1150, 2016.
- [22] S. Nitinawarat and P. Narayan, “Secret key generation for correlated Gaussian sources,” IEEE Trans. Inf. Theory, vol. 58, no. 6, pp. 3373–3391, 2012.
- [23] S. Watanabe and Y. Oohama, “Secret key agreement from correlated Gaussian sources by rate limited public communication,” IEICE Trans. Fundamentals, vol. 93, no. 11, pp. 1976–1983, 2010.
- [24] ——, “Secret key agreement from vector Gaussian sources by rate limited public communication,” IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 541–550, 2011.
- [25] C. Ye, A. Reznik, and Y. Shah, “Extracting secrecy from jointly Gaussian random variables,” in IEEE ISIT, 2006, pp. 2593–2597.
- [26] A. Khisti, “Secret-key agreement over non-coherent block-fading channels with public discussion,” IEEE Trans. Inf. Theory, vol. 62, no. 12, pp. 7164–7178, Dec 2016.
- [27] A. Khisti, S. N. Diggavi, and G. W. Wornell, “Secret-key generation using correlated sources and channels,” IEEE Trans. Inf. Theory, vol. 58, no. 2, pp. 652–670, 2012.
- [28] M. Hayashi and V. Y. F. Tan, “Equivocations, exponents, and second-order coding rates under various Rényi information measures,” IEEE Trans. Inf. Theory, vol. 63, no. 2, pp. 975–1005, 2017.
- [29] T. Van Erven and P. Harremos, “Rényi divergence and kullback-leibler divergence,” IEEE Trans. Inf. Theory, vol. 60, no. 7, pp. 3797–3820, 2014.
- [30] M. H. Yassaee, M. R. Aref, and A. Gohari, “Achievability proof via output statistics of random binning,” IEEE Trans. Inf. Theory, vol. 60, no. 11, pp. 6760–6786, Nov 2014.
- [31] R. G. Gallager, “Source coding with side information and universal coding,” LIDS, MIT, Tech. Rep., 1976.
- [32] T. M. Cover and J. A. Thomas, Elements of information theory. John Wiley & Sons, 2012.
- [33] T. Tsurumaru and M. Hayashi, “Dual universality of hash functions and its applications to quantum cryptography,” IEEE Trans. Inf. Theory, vol. 59, no. 7, pp. 4700–4717, 2013.
- [34] M. N. Wegman and J. L. Carter, “New hash functions and their use in authentication and set equality,” Journal of computer and system sciences, vol. 22, no. 3, pp. 265–279, 1981.
- [35] J. L. Carter and M. N. Wegman, “Universal classes of hash functions,” Journal of computer and system sciences, vol. 18, no. 2, pp. 143–154, 1979.
- [36] M. Hayashi, “Security analysis of -almost dual universal2 hash functions: Smoothing of min entropy versus smoothing of rényi entropy of order ,” IEEE Trans. Inf. Theory, vol. 62, no. 6, pp. 3451–3476, June 2016.
- [37] R. G. Gallager, Information Theory and Reliable Communication. New York: Wiley, 1968.