Generating secret in a network

Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2010.

Bibliographic Details
Main Author: Chan, Chung, Ph. D. Massachusetts Institute of Technology
Other Authors: Lizhong Zheng.
Format: Thesis
Language:eng
Published: Massachusetts Institute of Technology 2011
Subjects:
Online Access:http://hdl.handle.net/1721.1/62386
_version_ 1811070579959136256
author Chan, Chung, Ph. D. Massachusetts Institute of Technology
author2 Lizhong Zheng.
author_facet Lizhong Zheng.
Chan, Chung, Ph. D. Massachusetts Institute of Technology
author_sort Chan, Chung, Ph. D. Massachusetts Institute of Technology
collection MIT
description Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2010.
first_indexed 2024-09-23T08:38:17Z
format Thesis
id mit-1721.1/62386
institution Massachusetts Institute of Technology
language eng
last_indexed 2024-09-23T08:38:17Z
publishDate 2011
publisher Massachusetts Institute of Technology
record_format dspace
spelling mit-1721.1/623862019-04-09T18:54:22Z Generating secret in a network Chan, Chung, Ph. D. Massachusetts Institute of Technology Lizhong Zheng. Massachusetts Institute of Technology. Dept. of Electrical Engineering and Computer Science. Massachusetts Institute of Technology. Dept. of Electrical Engineering and Computer Science. Electrical Engineering and Computer Science. Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2010. Cataloged from PDF version of thesis. Includes bibliographical references (p. 247-253) and index. This monograph studies the theory of information through the multiuser secret key agreement problem. A general notion of mutual dependence is established for the secrecy capacity, as a natural generalization of Shannon's mutual information to the multivariate case. Under linear-type source models, this capacity can be achieved practically by linear network codes. In addition to being an unusual application of the network coding solution to a secrecy problem, it gives secrecy capacity an interpretation of network information flow and partition connectivity, further confirming the intuitive meaning of secrecy capacity as mutual dependence. New identities in submodular function optimization and matroid theory are discovered in proving these results. A framework is also developed to view matroids as graphs, allowing certain theory on graphs to generalize to matroids. In order to study cooperation schemes in a network, a general channel model with multiple inputs is formulated. Single-letter secrecy capacity upper bounds are derived using the Shearer-type lemma. Lower bounds are obtained with a new cooperation scheme called the mixed source emulation. In the same way that mixed strategies may surpass pure strategies in zero-sum games, mixed source emulation outperforms the conventional pure source emulation approach in terms of the achievable key rate. Necessary and sufficient conditions are derived for tightness of these secrecy bounds, which shows that secrecy capacity can be characterized for a larger class of channels than the broadcast-type channels considered in previous work. The mixed source emulation scheme is also shown to be unnecessary for some channels while insufficient for others. The possibility of a better cooperative scheme becomes apparent, but a general scheme remains to be found. by Chung Chan. Ph.D. 2011-04-25T15:50:52Z 2011-04-25T15:50:52Z 2010 2010 Thesis http://hdl.handle.net/1721.1/62386 709778157 eng M.I.T. theses are protected by copyright. They may be viewed from this source for any purpose, but reproduction or distribution in any format is prohibited without written permission. See provided URL for inquiries about permission. http://dspace.mit.edu/handle/1721.1/7582 255 p. application/pdf Massachusetts Institute of Technology
spellingShingle Electrical Engineering and Computer Science.
Chan, Chung, Ph. D. Massachusetts Institute of Technology
Generating secret in a network
title Generating secret in a network
title_full Generating secret in a network
title_fullStr Generating secret in a network
title_full_unstemmed Generating secret in a network
title_short Generating secret in a network
title_sort generating secret in a network
topic Electrical Engineering and Computer Science.
url http://hdl.handle.net/1721.1/62386
work_keys_str_mv AT chanchungphdmassachusettsinstituteoftechnology generatingsecretinanetwork