ebook img

Achieving SK Capacity in the Source Model: When Must All Terminals Talk? PDF

0.12 MB·
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Achieving SK Capacity in the Source Model: When Must All Terminals Talk?

Achieving SK Capacity in the Source Model: When Must All Terminals Talk? Manuj Mukherjee† Navin Kashyap† Yogesh Sankarasubramaniam‡ Abstract—In thispaper,we addresstheproblemof character- of interest to us is the following: characterize the instances izing the instances of the multiterminal source model of Csisza´r of the multiterminal source model in which omnivocality is and Narayan in which communication from all terminals is necessary for maximal-rate SK generation. In this paper, we 4 needed for establishing a secret key of maximum rate. We give report partial progress made towards such a characterization. 1 an information-theoreticsufficientcondition for identifyingsuch 0 instances. We believe that our sufficient condition is in fact an The paper is organized as follows. After establishing the 2 exact characterization, but we are only able to prove this in the required notation and background in Section II, we give, in caseofthethree-terminalsourcemodel.Wealsogivearelatively SectionIII, asufficientconditionunderwhichomnivocalityis n simple criterion for determining whether or not our condition a necessary for achieving SK capacity in a source model with holds for a given multiterminal source model. J m ≥ 3 terminals. This condition is satisfied, for example, in 0 I. INTRODUCTION the case of the complete graph pairwise independentnetwork 2 (PIN) model of Nitinawarat and Narayan [7]. We conjecture We are concerned with the multiterminal source model of that our sufficient condition is also necessary, but at present, ] Csisza´r and Narayan [3], which can be briefly described as T we can only prove this in the m = 3 case. Finally, in follows. There are a certain number, m ≥ 2, of terminals, I SectionIV,wegivea usefulcriterionforcheckingwhetheror . each of which observes a distinct component of a source of s not our condition holds for a given source model. c correlated randomness. The terminals must agree on a shared [ SK by communicating over a noiseless public channel. This II. PRELIMINARIES key must be protected from a passive eavesdropper having 1 Throughout,weuseNtodenotethesetofpositiveintegers. v access to the public communication. The SK capacity, which In the multiterminal source model [3], a set of m ≥ 2 7 is the supremum of the rates of SKs that can be generated, 3 has been characterized in various ways [2], [3], [7]. What is terminals, denoted by [m] , {1,2,...,m}, has access to a 0 source (Xn,Xn,...,Xn), n∈N, where Xn denotesn i.i.d. less well-understood is the nature of public communication 1 2 m i 5 copies of a random variable (rv) X taking values in a finite that is needed to achieve SK capacity in this model. In a i . 1 companionpaper[6],wegavealowerboundontheminimum setXi.ThervsX1,X2,...,Xm areingeneralcorrelated,and 0 foreachi∈[m],theithterminalobservesonlythecomponent rate of communication required to generate a maximal-rate 4 Xn. For any subset A ⊆ [m], we will use X to denote the 1 (i.e., capacity-achieving)SK, building upon the prior work of i A collection of rvs (X : i ∈ A), and p to denote their joint : Tyagi[9]onthetwo-terminalmodel.Inthispaper,weaddress i XA v probability mass function. arelatedquestion:whenmustallmterminalsnecessarilyhave i X to communicate in order to generate a maximal-rate SK? The terminals communicate through a noiseless public channel, any communicationsent throughwhich is accessible r It is well known that, in order to generate a maximal-rate a to all terminals and to potential eavesdroppers as well. The SKinthetwo-terminalmodel(m=2),itissufficientforonly terminals communicate in a round-robin fashion, following oneterminaltocommunicate[1],[5],[3].Allthisterminalhas thecyclicorder(1,2,...,m).Anytransmissionsentbytheith to do is convey its local observations to the other terminal at terminalisadeterministicfunctionofXn andalltheprevious the least possible rate of communication required to do so. i communication.Formally,avalidcommunicationisafinitely- Thus, when m = 2, it is never necessary for both terminals supported random vector F = (F ,F ,...,F ), r ∈ N, with to communicate to generate a capacity-achieving SK. Even 1 2 r F denoting a communication sent by the terminal i ∈ [m] when m > 2, there are examples wherein not all terminals j withi≡j(mod m),andH(F |F ,...,F ,Xn)=0.The need to communicate — see remark following Theorem 1 in j 1 j−1 i rate of the communicationis taken to be 1 log |F|, where F [3].However,aswewillshowinthispaper,thereareplentyof n 2 is the finite set on which F is supported. Terminal i∈[m] is otherexampleswhereallterminalsmustcommunicateinorder said to be silent if F = 0 (with probability 1) for all j ≡ i toachieveSKcapacity.Wecointheterm“omnivocality”tode- j (mod m). An omnivocal communication is one in which no scribethestate whenallterminalscommunicate.Theproblem terminal is silent. †M. Mukherjee and N. Kashyap are with the Department of Electrical Given an ǫ>0, we say that an rv U is ǫ-recoverable from Communication Engineering, Indian Institute of Science, Bangalore. Email: an rv V if there exists a function g of V such that Pr[U = {manuj,nkashyap}@ece.iisc.ernet.in. g(V)]≥1−ǫ. ‡Email:[email protected] Definition 1. For any ǫ > 0, an ǫ-SK for [m] is an rv K = allowed to communicate, while terminals in [m] \ T must K(n)(Xn ), for some n ∈ N, such that there exists a valid remainsilent.Thus,wearerestrictedtovalidcommunications [m] communication F with the following properties: Finwhichtheterminalsin[m]\T aresilent,butwhichallow (i) I(K;F)≤ǫ; and all m terminalsto agree upona weak SK. In other words, we (ii) K is ǫ-recoverable from (Xn,F) for each i∈[m]. only consider weak ǫ-SKs for [m] that are obtainable through i The rate of this ǫ-SK is given by 1H(K). valid communicationsF in which all terminals in [m]\T are n silent. Thesupremumof ratesachievableby suchSKs will be A real number R ≥ 0 is an achievable SK rate if for denoted by C([m]kT). any ǫ > 0, there exists an ǫ-SK of rate greater than R−ǫ. The SK capacity C([m]) is defined as the supremum of all Theorem1 ([4],Theorem6). C([m]kT)=H(XT)−RT(min), achievable SK rates. The SK capacity can be expressedas [2, where R(min) = min R , the rate region R being the Theorem 1.1] (see also [3, Eq. (26)]) T R∈RT i∈T i T set of all points R=(RX,i∈T) such that i 1 C([m])=I(X[m]),mPin|P|−1D pX[m] k pXA! Ri ≥H(XA∩T|XAc) ∀A([m], A∩T 6=∅. AY∈P (1) i∈XA∩T the minimumbeing taken overall partitionsP of [m], of size Note that if C([m]) > C([m]kT) for all T ⊂ [m] of size |P| ≥ 2. The quantity D(·k·) denotes relative entropy, and |T| = m−1, then omnivocality is necessary for achieving for a partition P = {A ,...,A }, the notation p 1 k A∈P XA SK capacity. Thus, our approach for showing that omnivocal represents the product p ×···×p . Note that when m=2, the quantity I(XXA)1 defined inX(1A)ksimplyQreduces to communicationisneededincertaincasesisto useTheorem1 [m] the mutual information I(X ;X ). Thus, I(X ) should be to prove that C([m]) > C([m]kT) for all (m − 1)-subsets viewed as a multiparty exten1sion2of mutual inf[omr]mation. T ⊂ [m]. For this, we will need a lower bound on RT(min) when |T| = m−1. To prove this bound, we use a simpler Before proceeding further, a couple of clarifications con- characterization (than that given in Theorem 1) of the rate cerning Definition 1 are needed. We have adopted the notion region R when |T|=m−1. of strong secrecy (property (i) in the definition), as opposed T to weak secrecy, which only requires 1I(K;F) ≤ ǫ. All the Lemma 2. Let T = [m]\{u} for some u ∈ [m]. The rate n results proved in this paper would hold just as well under region R is the set of all points (R , i∈T) such that T i either type of secrecy. In particular, our main result shows R ≥H(X |X ) ∀B (T,B 6=∅, (2) that omnivocal communication is necessary for achieving i B T\B SK capacity if a certain condition on the singleton partition iX∈B S is satisfied. Our proof of this result relies only on the and R ≥H(X |X ). i T u expression for SK capacity given in (1), which remains the i∈T same under both forms of secrecy [3], and on a theorem of X Proof:ObservethatR isdefinedbyconstraintsonsums GohariandAnantharam[4],whichis statedandprovedunder T of the form R for non-empty subsets B ⊆ T. When the weak secrecy notion. Thus, our proof in fact shows that i∈B i B =T, the constraint is simply R ≥H(X |X ). omnivocal communication is necessary even under a weak P i∈T i T u Now, consider any non-empty B ( T. From Theorem 1, secrecy requirement on SKs. P we see that constraints on R arise as constraints on i∈B i A second clarification concerning Definition 1 is that, R in two ways: when A = B and when A = B ∪ usually, the definition of an ǫ-SK includes an additional {ui}∈.AT∩hTus,iwe have two conPstraints on R : requirement that K be almost uniformly distributed over its P i∈B i alphabet K, i.e., H(K) ≥ log|K|−ǫ [3]. However, this can R ≥H(X |X P), i B [m]\B always be dropped without affecting SK capacity — see e.g., i∈B X the discussion on p. 3976 in [4]. obtained when A=B, and Asmentionedabove,wemakeuseofaresultofGohariand R ≥H(X |X ), Anantharam[4,Theorem6]insomeofourproofs.Tostatethis i B T\B result,we explicitlydefinea weakǫ-SK for[m] to beanrvK iX∈B as in Definition 1, except that the strong secrecy condition (i) obtained when A = B ∪{u}. The latter constraint is clearly is replaced by the weak secrecy condition, 1I(K;F) ≤ ǫ. stronger, so we can safely discard the former. n Then, R≥0 is an achievable weak-SK rate if for any ǫ>0, We can now prove the desired lower bound on R(min). T there exists a weak ǫ-SK of rate greater than R − ǫ. It is Lemma 3. Let m ≥ 3 be given. For T ⊂ [m] with |T| = known that the supremum of achievable weak-SK rates is the m−1, we have sameastheSKcapacitygivenby(1).TheGohari-Anantharam 1 resultconcernsachievableweak-SKratesundertheadditional R(min) ≥ H(X |X ). assumption that some fixed subset of terminals remains silent T m−2 T\{j} j j∈T X throughout. Let T ⊆ [m] be such that terminals in T are Proof:ConsideranyT ⊂[m]with|T|=m−1.Foreach The pairwise independent network (PIN) model of Niti- j ∈ T, let B = T \{j}. Now, let (R ,i ∈ T) be any point nawarat and Narayan [7] is defined on an underlying graph j i in R . Applying (2) with B =B , we get G = (V,E) with V = [m]. For n ∈ N, let G(n) be the T j multigraph (V,E(n)), where E(n) is the multiset of edges R ≥H(X |X ), i T\{j} j formed by taking n copies of each edge of G. Associated iX∈Bj with each edge e∈E(n) is a Bernoulli(1/2) rv ξe; the rvs ξe for each j ∈T. Summing over all j ∈T, we obtain associated with distinct edges in E(n) are independent. With this, the rvs Xn, i ∈ [m], are defined as Xn = (ξ : e ∈ Ri ≥ H(XT\{j}|Xj). (3) E(n) and e is inicident on i). When G = K i, the coemplete m jX∈TiX∈Bj jX∈T graphon m vertices, we have the complete graphPIN model. Exchanging the order of summation in the double sum on We show in the next section (Corollary 7.2) that for the the left-hand side (LHS) above, we have R = complete graph PIN model, the singleton partition S is the Puit∈tiTng thji∈sBbiaRcki i=nto (3i∈),Tw(me g−et2)Ri =P(mj∈−T P2)i∈Bij∈TiRi. duinaitqeulye fmoilnloiwmsizferromforTIh(eXor[mem]).4T.he result below then imme- P P P P 1 Corollary 4.1. In the PIN model defined on the complete R ≥ H(X |X ). i m−2 T\{j} j graph Km, m ≥ 3, omnivocal communication is necessary i∈T j∈T X X for achieving C(X ). [m] Sincethisholdsforany(R ,i∈T)∈R ,thelemmafollows. i T In conjunction with Theorem 6 in [6], we now have the following picture for a capacity-achieving communication in III. OMNIVOCAL COMMUNICATION the complete graph PIN model: the communication must be omnivocal, and if it is constrained to be a linear function AspointedoutintheIntroduction,inthesourcemodelwith of the observations Xn , then it must have rate at least two terminals, omnivocality is never necessary for generating [m] a maximal-rate SK. However, the situation is different when m(m−2)/2. It should be noted that the capacity-achieving there are three or more terminals. In this section, we give a communicationintheproofof[7,Theorem1]isanomnivocal, sufficientconditionfor omnivocalitybeingneededfor achiev- linear communication of rate m(m−2)/2. ing SK capacity when there are m≥3 terminals, and give an For the proof of Theorem 4, we need some convenient example where the sufficient condition is met. The sufficient notation. For T ⊂ [m], |T| = m − 1, define ∆ (S) , T conditionalsoturnsouttobenecessarywhenthereareexactly 1 [ H(X )−H(X )]. m−2 i∈T i T three terminals. LemmPa 5. For m≥3 terminals, if the singleton partition S Tostateourresults,weneedafewdefinitions.Thepartition is the uniqueminimizer forI(X ), then ∆ (S)<∆(S) for {{1},{2},...,{m}}consistingofm singletoncellswillplay [m] T all T ⊂[m] with |T|=m−1. aspecialroleinourresults;wecallthisthesingletonpartition and denote it by S. For any partition P of [m] with |P|≥2, Proof: For any u ∈ [m], consider T = [m]\{u}. Using define ∆(S)= 1 [ m H(X )−H(X )] and the definition of m−1 i=1 i [m] ∆ (S) above, it is easy to verify the identity ∆(P), 1 H(X )−H(X ) . (4) T P |P|−1 A [m] m−1∆(S)=∆ (S)+ 1 I(X ;X ). "A∈P # m−2 T m−2 u T X Equivalently, Re-arranging the above, we obtain 1 ∆T(S)−∆(S)= m1−2[∆(S)−I(Xu;XT)] ∆(P)= D p k p , |P|−1 X[m] XA = 1 [∆(S)−∆(P)], (5) A∈P ! m−2 Y the notation being as in (1). Thus, C([m]) = I(X ) = where P is the 2-cell partition {{u},T} of [m]. By assump- [m] min ∆(P). In all that follows, we say that the singleton tion, the expression in (5) is strictly negative. P partition S is a minimizer for I(X ) if ∆(S) = I(X ), With this, we are ready to prove Theorem 4. [m] [m] andthatS istheuniqueminimizerforI(X )iftheminimum Proof of Theorem 4: We will show that C([m]) > [m] in (1) is uniquely achieved by S, i.e., ∆(S) < ∆(P) for all C([m]kT) for any T ⊂ [m] with |T| = m−1. First, note partitions P of [m], P 6=S, with |P|≥2. that since S is, by assumption, a minimizer for I(X ), we [m] We can now state the main result of this section. have C([m]) = I(X ) = ∆(S). Next, by Theorem 1 and [m] Lemma 3, we have Theorem4. Form≥3terminals,ifS istheuniqueminimizer for I(X[m]), then omnivocal communication is necessary for C([m]kT)≤H(XT)− m1−2 H(XT\{i}|Xi), achieving the SK capacity C([m]). i∈T X Before provingthe theorem,we give an examplewhere the = 1 (m−2)H(X )− [H(X )−H(X )] m−2 T T i condition of the theorem is met. (cid:20) i∈T (cid:21) X =∆ (S). a communication in which terminals 2 and 3 are both silent. T Therefore, C([m]kT) ≤ ∆ (S) < ∆(S) = C([m]), the Now, consider Case II, in which we obviously have T second inequality coming from Lemma 5. C([3]) = I(X ;X ). The idea here is to show that a {1,2} 3 valid communication of rate H(X |X ) exists in which For the three-terminal source model, it turns out that {1,2} 3 terminal 3 is silent, and which allows ǫ-recoverability of the unique minimizer condition in Theorem 4 is also (Xn,Xn) at all three terminals. Given this, an application necessary for the conclusion of the theorem to hold. 1 2 of [3, Lemma B.3] shows that an SK rate of H(X )− Note that when m = 3, (1) reduces to C(X ) = {1,2} [3] H(X |X )=I(X ;X )isachievable.Thus,thereisa min{I(X ;X ),I(X ;X ),I(X ;X ),∆(S)}; so {1,2} 3 {1,2} 3 {1,2} 3 {1,3} 2 {2,3} 1 C([3])-achievingcommunicationinwhichterminal3issilent. the unique minimizer condition is equivalent to To show that the desired communication exists, we argue ∆(S)<min{I(X{1,2};X3),I(X{1,3};X2),I(X{2,3};X1)}. as follows. For i=1,2, let Ri be the rate at which terminali communicates. A standard random binning argument shows Theorem 6. In the three-terminal source model, omnivocal that an achievable (R ,R ) region, with terminal 3 silent, 1 2 communication is necessary for achieving SK capacity iff the for a communication intended to allow ǫ-recoverability of singleton partition S is the unique minimizer for I(X[m]). (Xn,Xn) at all terminals is given by 1 2 Proof: The “if” part is by Theorem 4. R ≥H(X |X ), R ≥H(X |X ), 1 1 2 2 2 1 For the “only if” part, suppose that ∆(S) ≥ (9) R +R ≥H(X |X ). min{I(X ;X ),I(X ;X ),I(X ;X )}. Then, 1 2 {1,2} 3 {1,2} 3 {1,3} 2 {2,3} 1 ∆(S) is either (a) greater than or equal to at least two of the Now, using the assumption in Case II that ∆(S) ≥ three terms in the minimum, or (b) greater than or equal to I(X ;X ), we will prove that the inequality {1,2} 3 exactly one term. Up to symmetry, it suffices to distinguish H(X |X )+H(X |X )≤H(X |X ) (10) between two cases: 1 2 2 1 {1,2} 3 Case I: ∆(S)≥max{I(X{1,2};X3),I(X{1,3};X2)} holds.Itwouldthenfollowfrom(9)thatthereexistachievable Case II: min{I(X{1,3};X2),I(X{2,3};X1)} > ∆(S) ≥ rate pairs (R1,R2) with R1 + R2 = H(X{1,2}|X3), thus I(X{1,2};X3) completing the proof for Case II. In each case, we demonstrate a capacity-achieving communi- So,letusprove(10).Wehave∆(S)= 1[H(X )+H(X )+ 2 1 2 cation in which at least one terminal remains silent. H(X ) − H(X )] and I(X ;X ) = H(X ) + 3 [3] {1,2} 3 {1,2} H(X )−H(X ). Using these expressions in the inequality We deal with Case I first. Observe that 3 [3] ∆(S) = 1 3 H(X )−H(X ) can also be written ∆(S)≥I(X{1,2};X3), and re-arranging terms, we obtain 2 i=1 i [3] a∆s(S12)[I≥(X1I;(XXhP2) +;XI(X),{1u,p2o};nXs3o)m].eTirhe-uosr,gatnhiezataiossnu,mypietilodns 12[H(X1)+H(X2)−2H(X{1,2})]≥ 12[H(X3)−H(X[3])], {1,2} 3 I(X ;X )≥I(X ;X ), i.e., which is equivalent to (10). This completes the proof of the 1 2 {1,2} 3 theorem. I(X ;X )≥I(X ;X )+I(X ;X |X ). (6) 1 2 1 3 2 3 1 We in fact conjecture that the result of Theorem 6 should Similarly, using the identity ∆(S) = 1[I(X ;X ) + extend to more than three terminals as well. 2 1 3 I(X ;X )] in the assumption ∆(S)≥I(X ;X ), we {1,3} 2 {1,3} 2 Conjecture 1. In the multiterminalsource modelwith m≥3 obtain I(X ;X )≥I(X ;X ), i.e., 1 3 {1,3} 2 terminals, omnivocal communication is necessary for achiev- I(X ;X )≥I(X ;X )+I(X ;X |X ). (7) ing SK capacity iff the singleton partition is the unique 1 3 1 2 1 3 2 minimizer for I(X ). [m] The equalities in (6) and (7) can simultaneously hold iff At this point, we do not have a systematic approach for I(X ;X )=I(X ;X ) and 1 2 1 3 (8) proving the “only if” part of the conjecture for m≥4. I(X ;X |X )=I(X ;X |X )=0. 1 3 2 2 3 1 IV. SINGLETONPARTITIONS From (8), it is not hard to deduce that the quantities I(X ;X ), I(X ;X ), I(X ;X ) and ∆(S) are The condition that the singleton partition be a unique {1,2} 3 {1,3} 2 {2,3} 1 all equal to I(X ;X ). In particular, C(X )=I(X ;X ). minimizer for I(X ) plays a key role in the results of 1 2 [3] 1 2 [m] From the first equality in (8), we also have H(X |X ) = Section III. Thus, it would be very useful to have a way of 1 2 H(X |X ). Now, it can be shown by a standard random checkingwhetherthisconditionholdsforagivensourceX , 1 3 [m] binning argument that there exists a communication from m ≥ 3. The brute force method of comparing ∆(S) with terminal 1 of rate H(X |X ) = H(X |X ) such that Xn ∆(P) for all partitions P with at least two parts requires 1 2 1 3 1 is ǫ-recoverable at both terminals 2 and 3. It then follows an enormous amount of computation. Indeed, the number from the “balanced coloring lemma” [3, Lemma B.3] that an of partitions of an m-element set is the mth Bell number, SK rate of H(X1)−H(X1|X2) = I(X1;X2) is achievable. Bm, an asymptoticestimate forwhich is (logw)1/2wm−wew, Thus, the SK capacity, C([3])=I(X ;X ), is achievable by where w = m [1 + o(1)] is the solution to the equation 1 2 logm m = wlog(w+1) [8, Example 5.4]. The proposition below graph K (as defined in Section III) are not exchangeable m bringsdownthenumberofcomparisonsrequiredforverifying when m≥3, but they are isentropic. the unique minimizer condition to a “mere” 2m−m−2. Corollary 7.1. If X ,X ,...,X , m ≥ 3, are isentropic For any non-empty subset B = {b ,b ,...,b } of [m] 1 2 m 1 2 |B| rvs, then S is a minimizer for I(X ). with |B| < m, define P , {Bc,{b },{b },...,{b }} to [m] B 1 2 |B| bethepartitionof[m]consistingof|B|+1cells,ofwhich|B| Proof:ForapartitionP of[m]with|P|≥2,letusdefine cells are singletons comprising the elements of B. Note that 1 if |B| =m−1, then PB =S. δ(P) , |P|−1 H(XAc|XA) = H(X[m])−∆(P). A∈P X Proposition 7. For m ≥ 3, let Ω = {B ⊂ [m] : 1 ≤ |B|≤ By virtue of Proposition 7(a), we need to show that δ(P )≤ m−2}. The singleton partition S is B δ(S) for all B ∈Ω. (a) a minimizer for I(X ) iff ∆(S)≤∆(P ) ∀B ∈Ω; (b) the unique minimiz[emr]for I(X ) iff ∆B(S) < ∆(P ) For isentropic rvs, the quantity H(XB|XBc), for any [m] B B ⊆ [m], depends only on |B|. Hence, defining g(k) , ∀B ∈Ω. H(X |X ) for 1 ≤ k ≤ m, we can write δ(P ) = [k] [m]\[k] B Proof: We prove (b); for (a), we simply have to replace 1 g(|B|)+g(m−1) and δ(S) = m g(m−1). Thus, we |B| m−1 the ‘>’ in (11) below with a ‘≥’. havetoshowthat g(|B|) ≤ g(m−1) forallB ∈Ω.Thisfollows |B| m−1 The “only if” part is obvious. For the “if” part, suppose from the fact that for isentropic rvs, the function g(k)/k is that ∆(S)<∆(PB) for all B ⊂[m] with 1≤|B| ≤m−2. non-decreasing in k — see Appendix A. Consider any partition P of [m], P 6= S, with |P| ≥ 2. We OursecondapplicationofProposition7istothePINmodel. wish to show that ∆(P)>∆(S). Recall from Section III that this model is defined on an The following identity can be obtained from the definition underlying graph G = ([m],E). From the way that the rvs in (4) by some re-grouping of terms: X , i ∈ [m], are defined, it is not difficult to verify that for i |Ac|∆(P )=(|P|−1)[∆(P)+(m−1)∆(S)]. any partition P of [m] with |P|≥2, we have Ac A∈P |E(P)| X ∆(P)= , Thus, we have |P|−1 1 where|E(P)|denotesthenumberofedgese={i,j}∈E such ∆(P)= |Ac|∆(P )−(m−1)∆(S) |P|−1 Ac that i and j are in different cells of P. This, in conjunction A∈P X with Proposition 7, gives us a relatively simple criterion for 1 > |Ac|∆(S)−(m−1)∆(S) (11) verifying whether S is a (unique) minimizer for I(X ). As |P|−1 [m] A∈P anillustration,weapplythistothecompletegraphPINmodel. X =m∆(S)−(m−1)∆(S) = ∆(S). (12) Corollary7.2. ForthePINmodelonthecompletegraphK , m The inequality in (11) is due to the fact that at least one m ≥ 3, the singleton partition S is the unique minimizer for A ∈ P is not a singleton cell, so that P 6= S, and I(X ). Ac [m] hence, ∆(P ) > ∆(S) by assumption. To verify the first Ac Proof: It is easy to see that for any non-emptyB ([m], equality in (12), observe that A∈P|Ac|= A∈P i∈/A1= |E(P )|= m − |Bc| = 1|B|(2m−|B|−1). Hence, m 1=m(|P|−1). B 2 2 2 i=1 A∈P:i∈/A P P P (cid:0) (cid:1)|E((cid:0)PB)(cid:1)| 2m−|B|−1 m PNexPt, we apply the above proposition to some interesting ∆(PB)= = ≥ =∆(S), |B| 2 2 special cases. with equality iff |B| = m−1, i.e., P = S. The result now Random variables X ,X ,...,X , m ≥ 2, are called B 1 2 m follows from Proposition 7(b). isentropic if H(X ) = H(X ) for any pair of non-empty A B subsetsA,B ⊆[m] havingthe same cardinality.Equivalently, APPENDIX A X ,...,X are isentropic if, for all non-empty A ⊆ [m], 1 m the entropyH(XA) dependsonlyon|A|. One obviousconse- Here, we prove that for isentropic rvs X1,...,Xm, the quenceofthisdefinitionisthatfordisjointnon-emptysubsets function 1H(X |X ), defined for 1 ≤ k ≤ m, is non- k [k] [m]\[k] A,B ⊂[m],theconditionalentropyH(X |X )onlydepends decreasing in k. Define g(k) = H(X |X ). We show A B [k] [m]\[k] on |A| and |B|. that the difference kg(k +1)−(k +1)g(k) is always non- Clearly, i.i.d. rvs are isentropic. More generally, ex- negative, from which the result follows. changeable rvs are isentropic — rvs X1,X2,...,Xm are We have g(k + 1) = H(X[m]) − H(X{k+2,...,m}) and exchangeable if for all permutations σ of [m], the joint g(k) = H(X[m]) − H(X{k+1,...,m}) = g(k + 1) − distribution of (X1,X2,...,Xm) is the same as that of H(Xk+1|X{k+2,...,m}). Thus, (X ,X ,...,X ). However, isentropic rvs need σ(1) σ(2) σ(m) kg(k+1)−(k+1)g(k) not be exchangeable. It may be verified that the rvs =(k+1)H(X |X )−g(k+1). X ,X ,...,X in the PIN model defined on the complete k+1 {k+2,...,m} 1 2 m WeneedtoshowthattheRHSoftheequalityisnon-negative. This is straightforward: g(k+1)=H(X |X ) [k+1] {k+2,...,m} k+1 ≤ H(X |X ) i {k+2,...,m} i=1 X =(k+1)H(X |X ), k+1 {k+2,...,m} since, for 1 ≤ i ≤ k + 1, H(X |X ) = i {k+2,...,m} H(X |X ) by isentropy. k+1 {k+2,...,m} REFERENCES [1] R.AhlswedeandI.Csisza´r,“Commonrandomnessininformationtheory andcryptography,partI:Secretsharing,”IEEETrans.Inf.Theory,vol. 39,pp.1121–1132,July1993. [2] C.ChanandL.Zheng,“Mutualdependence forsecretkeyagreement,” Proc.44thAnnu.Conf.Inf.Sci.Syst.(CISS),2010. [3] I. Csisza´r and P. Narayan, “Secrecy capacities for multiple terminals,” IEEETrans.Inf.Theory,vol.50,pp.3047–3061, Dec.2004. [4] A.A.GohariandV.Anantharam,“Information-theoretic keyagreement of multiple terminals–Part I,” IEEE Trans. Inf. Theory, vol. 56, no. 8, pp.3973–3996, Aug.2010. [5] U.M.Maurer,“Secretkeyagreementbypublicdiscussionfromcommon information,”IEEETrans.Inf.Theory,vol.39,pp.733–742,May1993. [6] M. Mukherjee and N. Kashyap, “On the communication complex- ity of secret key generation in the multiterminal source model.” arXiv:1401.1117. [7] S. Nitinawarat and P. Narayan, “Perfect omniscience, perfect secrecy andSteinertreepacking,”IEEETrans.Inf.Theory,vol.56,no.12,pp. 6490–6500, Dec.2010. [8] A.M. Odlyzko, “Asymptotic enumeration methods,” in Handbook of Combinatorics, R.L.Grahametal.,eds.,1995,pp.1063–1229. [9] H.Tyagi,“Commoninformationandsecretkeycapacity,” IEEETrans. Inf.Theory,vol.59,no.9,pp.5627–5640, Sep.2013.

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.