-
A Channel Model of Transceivers for Multiterminal Secret Key Agreement
Authors:
Alireza Poostindouz,
Reihaneh Safavi-Naini
Abstract:
Information theoretic secret key agreement is impossible without making initial assumptions. One type of initial assumption is correlated random variables that are generated by using a noisy channel that connects the terminals. Terminals use the correlated random variables and communication over a reliable public channel to arrive at a shared secret key. Previous channel models assume that each te…
▽ More
Information theoretic secret key agreement is impossible without making initial assumptions. One type of initial assumption is correlated random variables that are generated by using a noisy channel that connects the terminals. Terminals use the correlated random variables and communication over a reliable public channel to arrive at a shared secret key. Previous channel models assume that each terminal either controls one input to the channel, or receives one output variable of the channel. In this paper, we propose a new channel model of transceivers where each terminal simultaneously controls an input variable and observes an output variable of the (noisy) channel. We give upper and lower bounds for the secret key capacity (i.e., highest achievable key rate) of this transceiver model, and prove the secret key capacity under the conditions that the public communication is noninteractive and input variables of the noisy channel are independent.
△ Less
Submitted 6 August, 2020;
originally announced August 2020.
-
A Capacity-achieving One-message Key Agreement With Finite Blocklength Analysis
Authors:
Setareh Sharifian,
Alireza Poostindouz,
Reihaneh Safavi-Naini
Abstract:
Information-theoretic secret key agreement (SKA) protocols are a fundamental cryptographic primitive that are used to establish a shared secret key between two or more parties. In a two-party SKA in source model, Alice and Bob have samples of two correlated variables, that are partially leaked to Eve, and their goal is to establish a shared secret key by communicating over a reliable public channe…
▽ More
Information-theoretic secret key agreement (SKA) protocols are a fundamental cryptographic primitive that are used to establish a shared secret key between two or more parties. In a two-party SKA in source model, Alice and Bob have samples of two correlated variables, that are partially leaked to Eve, and their goal is to establish a shared secret key by communicating over a reliable public channel. Eve must have no information about the established key. In this paper, we study the problem of one-message secret key agreement where the key is established by Alice sending a single message to Bob. We propose a one-message SKA (OM-SKA) protocol, prove that it achieves the one-way secret key capacity, and derive finite blocklength approximations of the achievable secret key length. We compare our results with existing OM-SKAs and show the protocol has a unique combination of desirable properties.
△ Less
Submitted 5 March, 2020; v1 submitted 10 May, 2019;
originally announced May 2019.
-
Wiretap Secret Key Capacity of Tree-PIN
Authors:
Alireza Poostindouz,
Reihaneh Safavi-Naini
Abstract:
We consider the problem of multiterminal secret key agreement (SKA) in wiretapped source model where terminals have access to samples of correlated random variables from a publicly known joint probability distribution. The adversary has access to a side information variable, that is correlated with terminals' variables. We focus on a special type of terminal variables in this model, known as Tree-…
▽ More
We consider the problem of multiterminal secret key agreement (SKA) in wiretapped source model where terminals have access to samples of correlated random variables from a publicly known joint probability distribution. The adversary has access to a side information variable, that is correlated with terminals' variables. We focus on a special type of terminal variables in this model, known as Tree-PIN, where the relation between variables of the terminals can be represented by a tree. The study of Tree-PIN source model is of practical importance as it can be realized in wireless network environments. We derive the wiretap secret key capacity of Tree-PIN with independent leakage, and give lower and upper bounds on the maximum achievable secret key length in finite-length regime. We then prove an upper bound and a lower bound for the wiretap secret key capacity of a wiretapped PIN and give two conditions for which these bounds are tight. We also extend our main result to two other related models and prove their corresponding capacities. At the end, we argue how our analysis suggests that public interaction is required for achieving the multiterminal WSK capacity.
△ Less
Submitted 5 January, 2022; v1 submitted 14 March, 2019;
originally announced March 2019.
-
Understanding quantum physics through simple experiments: from wave-particle duality to Bell's theorem
Authors:
Ish Dhand,
Adam D'Souza,
Varun Narasimhachar,
Neil Sinclair,
Stephen Wein,
Parisa Zarkeshian,
Alireza Poostindouz,
Christoph Simon
Abstract:
Quantum physics, which describes the strange behavior of light and matter at the smallest scales, is one of the most successful descriptions of reality, yet it is notoriously inaccessible. Here we provide an approachable explanation of quantum physics using simple thought experiments. We derive all relevant quantum predictions using minimal mathematics, without introducing the advanced calculation…
▽ More
Quantum physics, which describes the strange behavior of light and matter at the smallest scales, is one of the most successful descriptions of reality, yet it is notoriously inaccessible. Here we provide an approachable explanation of quantum physics using simple thought experiments. We derive all relevant quantum predictions using minimal mathematics, without introducing the advanced calculations that are typically used to describe quantum physics. We focus on the two key surprises of quantum physics, namely wave-particle duality, a term that was introduced to capture the fact that single quantum particles in some respects behave like waves and in other respects like particles, and entanglement, which applies to two or more quantum particles and brings out the inherent contradiction between quantum physics and seemingly obvious assumptions regarding the nature of reality. Following arguments originally made by John Bell and Lucien Hardy, we show that the so-called local hidden variables are inadequate at explaining the behavior of entangled quantum particles. This means that one either has to give up on hidden variables, i.e., the idea that the outcomes of measurements on quantum particles are determined before an experiment is actually carried out, or one has to relinquish the principle of locality, which requires that no causal influences should be faster than the speed of light and is a cornerstone of Einstein's theory of relativity. Finally, we describe how these remarkable predictions of quantum physics have been confirmed in experiments. We have successfully used the present approach in a course that is open to all undergraduate students at the University of Calgary, without any prerequisites in mathematics or physics.
△ Less
Submitted 1 August, 2018; v1 submitted 25 June, 2018;
originally announced June 2018.
-
Uncertainty, joint uncertainty, and the quantum uncertainty principle
Authors:
Varun Narasimhachar,
Alireza Poostindouz,
Gilad Gour
Abstract:
Historically, the element of uncertainty in quantum mechanics has been expressed through mathematical identities called uncertainty relations, a great many of which continue to be discovered. These relations use diverse measures to quantify uncertainty (and joint uncertainty). In this paper we use operational information-theoretic principles to identify the common essence of all such measures, the…
▽ More
Historically, the element of uncertainty in quantum mechanics has been expressed through mathematical identities called uncertainty relations, a great many of which continue to be discovered. These relations use diverse measures to quantify uncertainty (and joint uncertainty). In this paper we use operational information-theoretic principles to identify the common essence of all such measures, thereby defining measure-independent notions of uncertainty and joint uncertainty. We find that most existing entropic uncertainty relations use measures of joint uncertainty that yield themselves to a small class of operational interpretations. Our notion relaxes this restriction, revealing previously unexplored joint uncertainty measures. To illustrate the utility of our formalism, we derive an uncertainty relation based on one such new measure. We also use our formalism to gain insight into the conditions under which measure-independent uncertainty relations can be found.
△ Less
Submitted 15 March, 2016; v1 submitted 8 May, 2015;
originally announced May 2015.
-
Minimum Delay Huffman Code in Backward Decoding Procedure
Authors:
Alireza Poostindouz,
Adel Aghajan
Abstract:
For some applications where the speed of decoding and the fault tolerance are important, like in video storing, one of the successful answers is Fix-Free Codes. These codes have been applied in some standards like H.263+ and MPEG-4. The cost of using fix-free codes is to increase the redundancy of the code which means the increase in the amount of bits we need to represent any peace of information…
▽ More
For some applications where the speed of decoding and the fault tolerance are important, like in video storing, one of the successful answers is Fix-Free Codes. These codes have been applied in some standards like H.263+ and MPEG-4. The cost of using fix-free codes is to increase the redundancy of the code which means the increase in the amount of bits we need to represent any peace of information. Thus we investigated the use of Huffman Codes with low and negligible backward decoding delay. We showed that for almost all cases there is always a Minimum Delay Huffman Code for a given length vector. The average delay of this code for anti-uniform sources is calculated, that is in agreement with the simulations, and it is shown that this delay is one bit for large alphabet sources. Also an algorithm is proposed which will find the minimum delay code with a good performance.
△ Less
Submitted 24 November, 2013;
originally announced November 2013.
-
Redundancy and Decoherence: Gateways From Quantum World to The Classical
Authors:
Alireza Poostindouz,
Vahid Salari,
Hamidreza Mohammadi
Abstract:
In our daily life experiences we face localized objects which are "here or there" not "here and there". The state of a cat could be "dead and alive" at the same time from a quantum mechanical point of view, which is not in agreement with our classical life observations. If we assume that quantum theory can explain the large scale events, how is it possible that quantumness disappears in the classi…
▽ More
In our daily life experiences we face localized objects which are "here or there" not "here and there". The state of a cat could be "dead and alive" at the same time from a quantum mechanical point of view, which is not in agreement with our classical life observations. If we assume that quantum theory can explain the large scale events, how is it possible that quantumness disappears in the classical world? The answer lies in the interaction between the environment and the system of interest. Quantum Darwinism describes the proliferation of the quantum information of each system in the environment. We will show how entanglement plays a key role in coding and decoding the information of each system in its surrounding environment.
△ Less
Submitted 24 November, 2013;
originally announced November 2013.