Abstract

In this paper, we investigate how the use of a channel with perfect authenticity but no privacy can be used to repair the defects of a channel with imperfect privacy but no authenticity. More precisely, let us assume that Alice and Bob wish to agree on a secret random bit string, and have at their disposal an imperfect private channel and a perfect public channel. The private channel is imperfect in various ways: transmission errors can occur, and partial information can leak to an eavesdropper, Eve, who also has the power to suppress, inject, and modify transmissions arbitrarily. On the other hand, the public channel transmits information accurately, and these transmissions cannot be modified or suppressed by Eve, but their entire contents becomes known to her. We consider the situation in which a random bit string x has already been transmitted from Alice to Bob over the private channel, and we describe interactive public channel protocols that allow them, with high probability: (1) to assess the extent to which the private channel transmission has been corrupted by tampering and channel noise; and (2) if this corruption is not too severe, to repair Bob’s partial ignorance of the transmitted string and Eve’s partial knowledge of it by distilling from the transmitted and received versions of the string another string, in general shorter than x, upon which Alice and Bob have perfect information, while Eve has nearly no information (or in some cases exactly none), except for its length. These protocols remain secure against unlimited computing power.

Keywords

Alice and BobChannel (broadcasting)String (physics)Computer scienceImperfectComputer securityAlice (programming language)Oblivious transferIgnoranceTelecommunicationsCryptographyLawPhysicsPolitical sciencePhilosophyQuantum mechanicsLinguistics

Affiliated Institutions

Related Publications

Publication Info

Year
1988
Type
article
Volume
17
Issue
2
Pages
210-229
Citations
863
Access
Closed

External Links

Social Impact

Social media, news, blog, policy document mentions

Citation Metrics

863
OpenAlex

Cite This

Charles H. Bennett, Gilles Brassard, J. Robert (1988). Privacy Amplification by Public Discussion. SIAM Journal on Computing , 17 (2) , 210-229. https://doi.org/10.1137/0217014

Identifiers

DOI
10.1137/0217014