Low-density random matrices for secret key extraction

Secret key extraction, the task of extracting a secret key from shared information that is partially known by an eavesdropper, has important applications in cryptography. Motivated by the requirements of high-speed quantum key distribution, we study secret-key extraction methods with simple and effi...

Full description

Bibliographic Details
Main Authors: Zhou, Hongchao (Contributor), Chandar, Venkat B. (Contributor), Wornell, Gregory W. (Contributor)
Other Authors: Lincoln Laboratory (Contributor), Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science (Contributor), Massachusetts Institute of Technology. Research Laboratory of Electronics (Contributor)
Format: Article
Language:English
Published: Institute of Electrical and Electronics Engineers (IEEE), 2014-10-21T17:47:58Z.
Subjects:
Online Access:Get fulltext
LEADER 02087 am a22002653u 4500
001 91131
042 |a dc 
100 1 0 |a Zhou, Hongchao  |e author 
100 1 0 |a Lincoln Laboratory  |e contributor 
100 1 0 |a Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science  |e contributor 
100 1 0 |a Massachusetts Institute of Technology. Research Laboratory of Electronics  |e contributor 
100 1 0 |a Zhou, Hongchao  |e contributor 
100 1 0 |a Chandar, Venkat B.  |e contributor 
100 1 0 |a Wornell, Gregory W.  |e contributor 
700 1 0 |a Chandar, Venkat B.  |e author 
700 1 0 |a Wornell, Gregory W.  |e author 
245 0 0 |a Low-density random matrices for secret key extraction 
260 |b Institute of Electrical and Electronics Engineers (IEEE),   |c 2014-10-21T17:47:58Z. 
856 |z Get fulltext  |u http://hdl.handle.net/1721.1/91131 
520 |a Secret key extraction, the task of extracting a secret key from shared information that is partially known by an eavesdropper, has important applications in cryptography. Motivated by the requirements of high-speed quantum key distribution, we study secret-key extraction methods with simple and efficient hardware implementations, in particular, linear transformations based on low-density random matrices. We show that this method can achieve the information-theoretic upper bound (conditional Shannon entropy) on efficiency for a wide range of key-distribution systems. In addition, we introduce a numerical method that allows us to tightly estimate the quality of the generated secret key in the regime of finite block length, and use this method to demonstrate that low-density random matrices achieve very high performance for secret key extraction. 
520 |a United States. Air Force Office of Scientific Research (Grant FA9550-11-1-0183) 
520 |a United States. Defense Advanced Research Projects Agency. Information in a Photon (InPho) Program (Contract HR0011-10-C-0159) 
546 |a en_US 
655 7 |a Article 
773 |t Proceedings of the 2013 IEEE International Symposium on Information Theory