Keywords

1 Introduction

Information-theoretic (IT) or unconditional security—widely acknowledged as the strictest notion of security has witnessed a renaissance since the 90’s, arguably following Maurer’s seminal work on secret key (SK) agreement by public discussion from correlated source sequences [1, 2]. Compared to computational complexity-based approaches, IT-security provides a framework for provable security by bounding the adversary’s total information. Assumptions are made neither on the latter’s computational or memory resources nor on the unproven computational hardness of certain problems. By harnessing noise and appropriate coding and signaling strategies at the physical layer (the lowest layer in the protocol stack), IT-security potentially complements conventional upper layer cryptographic protocols (e.g., RSA, Diffie-Hellman key exchange) and is an important component of future communication networks [18]. The paradigm is especially valuable for improving security in large-scale wireless networks and distributed networks with minimal infrastructure (e.g., mobile ad hoc sensor networks) where the broadcast nature of the transmission medium makes it particularly vulnerable to attacks, and key distribution and management is difficult and computationally expensive [18].

But for all its advantages, unconditionally secure key distribution is impossible to realize from scratch, for instance, if the legitimate parties are only given access to a noiseless public communication channel [13]. This pessimism can however be relativized if the parties are additionally given access to simple auxiliary devices (e.g., noisy correlations or communication channels) that are not completely under the control of an adversary [14]. Thus, information-theoretic reductions between such primitives are of great interest.

Interconvertibility of noisy tripartite correlations and a uniformly distributed, noiseless SK have been studied under the rubric of SK agreement by public discussion (called the forward problem [1, 2]) and the dual problem of simulating a noisy correlation from noiseless SK and public communication (called the inverse problem [36]). In general, there are irreversible losses in exchanging noisy correlations in that, going from one noisy correlation to another and back is not lossless (even asymptotically) [3, 16]. In light of the resource character of noisy correlations in enabling SK agreement, and that of SK in simulating a tripartite correlation, quantifying such resources are of interest.

To make things precise, consider three distant parties, honest Alice and Bob, and an adversary Eve who observe sequences \({X^n}=(X_1,\ldots ,X_n)\), \({Y^n}=(Y_1,\ldots ,Y_n)\), and \({Z^n}=(Z_1,\ldots ,Z_n)\) respectively, where the sequence triple \((X^nY^nZ^n)\) has the generic component variables \((XYZ)\sim p_{XYZ}\). Starting with no initially shared SKs, and using only local operations and unlimited public communication (LOPC) over a noiseless, authenticated (but, otherwise insecure) channel, what is the maximum rate at which Alice and Bob can distil a SK (i.e., the maximum possible SK rate), such that Eve’s information (\(Z^n\) and the entire public discussion) about the generated SK is arbitrarily small? Conversely, starting with perfect SKs, what is the SK cost of approximately simulating the correlated triple XYZ using only LOPC?

We explore this duality between the secrecy extractable from \(p_{XYZ}\) and that required to simulate \(p_{XYZ}\) in light of a similar well-known operational duality between the two notions of common information (CI) due to Gács and Körner [7] and Wyner [8]. For the inverse problem of simulating \(p_{XYZ}\) from noiseless SK and unlimited public communication, Winter [4] gave a single-letter characterization of the asymptotic minimal SK cost of formation in terms of a conditional version of Wyner’s CI. We first show that the SK cost of formation can be simply reexpressed in terms of the existence of a bipartite protocol monotone. For the forward problem of key distillation from \(p_{XYZ}\), we construct simple distributions for which the conditional Gács and Körner CI captures the “explicit” secret CI, thus achieving a tight bound on the SK rate. We also comment on the interconvertibility of secret correlations under LOPC.

2 CI Duality and Secret CI

Random variables (RVs) and their finite alphabets are denoted using uppercase letters X and script letters \(\mathcal {X}\). \({X^n}\) denotes the sequence \((X_1,\ldots ,X_n)\). \(p_X(x)=\Pr \{X = x\}\) denotes the distribution (pmf) of a discrete RV X. \(X-Y-Z\) denotes that XYZ form a Markov chain satisfying \({p_{XYZ}} = {p_{XY}}{p_{Z|Y}}\). Likewise, XYZ is said to form a conditional Markov chain given U if \(X-UY-Z\). The entropy of X is defined as \(H(X)= -\sum \nolimits _{x \in \mathcal {X}} {p_X(x)\log p_X(x)}\) and the mutual information of X and Y is given by \(I(X;Y)=H(X)-H(X|Y)\). The total variational distance between \(p_X\) and \(p_{X'}\) is defined as \(\mathsf {TV}(p_X, p_{X'}) = \tfrac{1}{2}\sum \nolimits _{x \in \mathcal {X}}|p_X(x)-p_{X'}(x)|\).

The zero pattern of \({p_{XY}}\) can be specified by its characteristic bipartite graph \(B_{XY}\) with the vertex set \(\mathcal {X} \cup \mathcal {Y}\) and an edge connecting two vertices x and y iff \({p_{XY}}(x,y) \ge 0\). If \(B_{XY}\) contains only a single connected component, we say that \({p_{XY}}\) is indecomposable. An ergodic decomposition of \(p_{XY}(x,y)\) is defined by a unique partition of the space \(\mathcal {X}\times \mathcal {Y}\) into connected components. The following double markovity lemma [12] (also see Problem 16.25, p. 392 in [11]) is useful.

Lemma 1

A triple of RVs (XYQ) satisfies the double Markov conditions

$$\begin{aligned} X-Y-Q,\text { }Y-X-Q \end{aligned}$$
(1)

iff there exists a pmf \(p_{Q'|XY}\) such that \(H(Q'|X)=H(Q'|Y)=0\) and \(XY-Q'-Q\). Furthermore, (1) implies \(I(XY;Q)\le H(Q')\) with equality iff \(H(Q'|Q)=0\).

Proof

Given \(p_{Q|XY}\) such that \(X-Y-Q\) and \(Y-X-Q\), it follows that \(p_{XY}(x,y)>0 \Rightarrow p_{Q|XY}(q|x,y)=p_{Q|X}(q|x)=p_{Q|Y}(q|y)\) \(\forall q\). Given an ergodic decomposition of \(p_{XY}(x,y)\) such that \(\mathcal {X}\times \mathcal {Y}=\bigcup \nolimits _{{q'}} \mathcal {X}_{q'}\times \mathcal {Y}_{q'}\), where the \(\mathcal {X}_{q'}\) \('\)s and \(\mathcal {Y}_{q'}\) \('\)s having different subscripts are disjoint, define \(p_{Q'|XY}\) as \(Q'=q'\) iff \(x \in \mathcal {X}_{q'} \Leftrightarrow y \in \mathcal {Y}_{q'}\). Clearly \(H(Q'|X)=H(Q'|Y)=0\). Then, for any \(Q=q\) and for every \(q'\), \(p_{Q|XY}(q|\cdot ,\cdot )\) is constant over \(\mathcal {X}_{q'}\times \mathcal {Y}_{q'}\). This implies that \(p_{Q|XY}(q|x,y)=p_{Q|Q'}(q|q')\) so that \(XY-Q'-Q\). The converse is obvious. Thus, given (1), we get \(Q'\) such that \(I(XY;Q|Q')=0\) so that \(I(XY;Q)=I(XYQ';Q)=I(Q';Q)=H(Q')-H(Q'|Q)\le H(Q')\).    \(\square \)

Gács and Körner (GK) [7] defined CI as the maximum rate of common randomness (CR) (R) that Alice and Bob, observing \(X^n\) and \(Y^n\) separately can extract without communication \((R_0=0)\), i.e., \(C_{GK}(X;Y)=\sup \tfrac{1}{n}H(f_1(X^n))\) where the sup is taken over all sequences of pairs of deterministic mappings \((f_1^n,f_2^n)\) such that \(\Pr \{ f_1^n({X^n}) \ne f_2^n({Y^n})\} \rightarrow 0{\text { as }}n \rightarrow \infty \) (see setup in Fig. 1(a)). GK showed that

$$\begin{aligned} {C_{GK}}(X;Y) =\mathop {\max }\limits _{\begin{array}{c} Q:\text { }H(Q|X) = H(Q|Y) = 0 \end{array}} H(Q)= H(Q_*) \end{aligned}$$
(2)

where \(Q_*\) is the maximal common RV of the pair (XY) induced by the ergodic decomposition of \({p_{XY}}\). For all XY, we have \(I(X;Y)=H(Q_*)+I(X;Y|Q_*)\). We say that \(p_{XY}\) is resolvable, if \(I(X;Y|Q_*)=0\). An alternative characterization of \(C_{GK}(X;Y)\) follows from Lemma 1 [12].

$$\begin{aligned} {C_{GK}}(X;Y) = \mathop {\max }\limits _{\begin{array}{c} Q:\text { }Q-X-Y, \text { } Q-Y-X \end{array}} I(XY;Q),{\text { }}|\mathcal {Q}| \le |\mathcal {X}||\mathcal {Y}|+2 \end{aligned}$$
(3)

\(C_{GK}(X;Y)\) is identically zero for all indecomposable distributions. For example, a binary symmetric channel with non-zero crossover probability is indecomposable and hence \(C_{GK}(X;Y)=0\). Thus, CR is a far stronger resource than correlation, in that the latter does not result in common random bits, in general. Nevertheless, when Alice communicates with Bob (\(R_0>0\)), they can unlock hidden layers of potential CR [9]. With a high enough rate of communication (that is independent of Bob’s output), the CR rate increases to I(XY) [9].

A conditional version of GK CI is defined as follows.

$$\begin{aligned} {C_{GK}}(X;Y|Z)= H(Q_*|Z)=\mathop {\max }\limits _{\begin{array}{c} Q:H(Q|XZ)=0\\ H(Q|YZ) = 0 \end{array}} H(Q|Z) = \mathop {\max }\limits _{\begin{array}{c} Q-XZ-Y \\ Q-YZ-X \end{array}} I(XY;Q|Z) \end{aligned}$$
(4)

Conditioning always reduces GK CI, i.e., \({C_{GK}}(X;Y|Z)\) \(\le \) \({C_{GK}}(X;Y)\). We say that \(p_{XYZ}\) is conditionally resolvable, if \(I(X;Y|ZQ_*)=0\).

Wyner [8] defined CI as the minimum rate of CR (R) needed to generate \(X^n\) and \(Y^n\) separately using local operations (independent noisy channels: \(Q \rightarrow X^n\), \(Q \rightarrow Y^n\)) and no communication \((R_0=0)\) (see setup in Fig. 1(b)).

$$\begin{aligned} {C_W}(X;Y) = \mathop {\min }\limits _{Q:X - Q - Y} I(XY;Q),{\text { }}|\mathcal {Q}| \le |\mathcal {X}||\mathcal {Y}| \end{aligned}$$
(5)

Likewise, a conditional version of Wyner’s CI is defined as follows.

$$\begin{aligned} {C_W}(X;Y|Z) = \mathop {\min }\limits _{Q:X - QZ - Y} I(XY;Q|Z) \end{aligned}$$
(6)

\({C_W}(X;Y)\) quantifies the resource cost for the distributed approximate simulation of \({p_{XY}}\). When Alice communicates with Bob (\(R_0>0\)), with a high enough rate of communication (independent of Bob’s output), the CR rate reduces to I(XY) [9]. Reversing the direction of Alice’s operation \((X^n \rightarrow Q^n)\) (see Fig. 1(c)) leads to a two-stage simulation of a noisy channel via the Markov chain \(X - Q - Y\). Now Alice and Bob can use the reverse Shannon theorem [10] to simulate a first stage, with Alice mapping \(X^n\) to some intermediate RV \(Q^n\) which she sends noiselessly to Bob. In the second stage, Bob locally maps \(Q^n\) to get \(Y^n\). This gives a nontrivial tradeoff between the (noiseless) communication rate \(R_0\) and CR rate R leading to an alternative characterization of Wyner’s CI as the communication cost of distributed channel simulation without any CR \((R = 0)\). With unlimited CR, the cost reduces to I(XY) [9]. Finally, to complete the duality, we note the following well-known relation between the different notions of CI [12]: \({C_{GK}}(X;Y) \le I(X;Y) \le {C_W}(X;Y)\) with equality holding iff \(p_{XY}\) is resolvable, whence \({C_{GK}}(X;Y) = I(X;Y) \Leftrightarrow I(X;Y) = {C_W}(X;Y)\).

Fig. 1.
figure 1

Common information duality (with communication): (a) Gács and Körner’s setup \((R_0=0)\) [7] (b) Wyner’s setup \((R_0=0)\) [8] (c) Inverting Alice’s channel gives an alternative characterization of Wyner’s CI as the communication cost of channel simulation without any CR \((R = 0)\) [9, 10] (d) Setup for SK agreement [13] (e) Setup for distributed simulation of \(p_{XYZ}\) from SK and public communication [36]

The setup for the standard SK agreement scenario [13, 14, 15] shown in Fig. 1(d) is a generalization of the GK setup (see Fig. 1(a)) that now allows for interactive communication. Consider the following distributed communication protocol, \(\Pi _{KA}\). Alice (X) and Bob (Y) communicate interactively over an authenticated (noiseless) public discussion channel (transparent to an adversary, Eve (Z)). Both have independent access to an infinite stream of private randomness. The protocol proceeds in rounds, where in each round each party flips private coins, and based on the messages exchanged so far, publicly sends a message to the other party. At the end of the protocol, Alice (Bob) either accepts or rejects the protocol execution, and outputs a key \(Q_X\) (\(Q_Y\)) depending on her (his) view of the protocol, which comprises of \(X^n\) (\(Y^n\)), all local computations, and the entire public communication (encapsulated in the RV C). The asymptotic maximum rate of SK distillation is called the SK rate [13].

Definition 1

The SK rate, S(XY||Z) is defined as the largest real number R such that for all \(\epsilon > 0\) , there exists an integer n and a randomized protocol \(\Pi _{KA}\) with communication C that with probability \(1-\epsilon \) , allows Alice (knowing \(X^n\) ) and Bob (knowing \(Y^n\) ) to compute \(Q_X\) and \(Q_Y\), respectively, satisfying \(\Pr \{{{Q}_{X}}={{Q}_{Y}}=Q\}\ge 1-\epsilon ,\text { }H(Q)=\log |\mathcal {Q}|\ge n(R-\epsilon ),\text { }I(Q;CZ^n)<\epsilon \).

Analogously, there exists an inverse protocol \(\Pi _{form}\), and a dual measure, the asymptotic minimal SK cost of formation of the triple \((X,Y,Z) \sim p_{XYZ}\) [36]. While the distributed channel synthesis problem [9] (setup in Fig. 1(b)) explores the role of CR and one-way communication in the formation of bipartite correlations \({p_{XY}}\) shared between honest Alice and Bob, the setup in Fig. 1(e) explores the role of secret CR (i.e., SK) and public communication in the distributed simulation of tripartite correlations \({p_{XYZ}}\), now additionally shared with an adversary Eve [36]. To start with, Alice and Bob share a SK in the form of R perfectly correlated bits, i.e., Alice has \(Q_X\) and Bob, \(Q_Y\) such that \(Q_X=Q_Y=Q\) and \(H(Q)=R\). The goal is to approximately simulate correlated sequence triples of the form \((X^n,Y^n,Z^n)\), upto a local degrading of \(Z^n\). Both parties have independent access to sources of private randomness. The protocol proceeds in rounds and at the end of the communication phase, Alice and Bob output \({\hat{X}^n}\) and \({\hat{Y}^n}\), respectively, as deterministic functions of their views, which comprises of the shared SK Q, all the private coins flipped so far, and the entire public communication (C). Discounting the private randomness by allowing for stochastic mappings, \(\Pi _{form}\) can be specified by the joint distribution \(p_{{\hat{X}^n}{\hat{Y}^n}CQ}\) \(=\) \(p_{{{\hat{X}^n}|CQ},{{\hat{Y}^n}|CQ}}p_{CQ}\). The resulting simulation is “good” from Alice and Bob’s point of view, if they end up correctly generating the marginal \(p_{X^nY^n}\). However, Eve (\(Z^n\)) might still have some information about \(X^nY^n\). This is formalized by requiring that Eve’s optimal channel \(p_{{\bar{Z}}|Z^n}\) is only able to simulate the public communication (C) used by Alice and Bob to generate \(({{\hat{X}^n},{\hat{Y}^n}})\). The following definition makes this precise [3].

Definition 2

The SK cost of formation, \(SK_c(X;Y|Z)\) is the infimum of all numbers \(R \ge 0\) such that for all \(\epsilon > 0\) , there exists an integer n and a randomized protocol \(\Pi _{form}\) with communication C that with probability \(1-\epsilon \) , allows Alice and Bob, knowing a common random \(\left\lfloor {nR} \right\rfloor \) -bit string Q, to compute \({{\hat{X}}^n}\) and \({{\hat{Y}}^n}\) , respectively, such that \(\Pr \{ ({{\hat{X}}^n},{{\hat{Y}}^n},C) = ({X^n},{Y^n},\bar{Z})\} \ge 1 -\epsilon \) holds for some correlated sequence triple \((X^n,Y^n,Z^n)\) that has generic component variables \((X,Y,Z)\sim p_{XYZ}\) and some channel \(p_{\bar{Z}|Z^n}\).

\({p_{XYZ}}\) contains secret correlations iff it cannot be generated by LOPC, i.e., \(SK_c(X;Y|Z)>0\) [17]. Both the SK cost of formation and the SK rate are measures of the secrecy content of \(p_{XYZ}\) and admit a clear operational interpretation: \(SK_c(X;Y|Z)\) quantifies the minimum amount of SK bits required to (approximately) simulate \(p_{XYZ}\), whereas S(XY||Z) quantifies the maximum amount of SK bits that one can extract from \(p_{XYZ}\).

Winter used resolvability-based arguments [4] to arrive at the full secret correlation vs. public communication trade-off for the inverse problem and defined the SK cost of formation with unlimited public communication as

$$\begin{aligned} {SK_c}(X;Y|Z) = \mathop {\min }\limits _{\begin{array}{c} Q:X - Q\bar{Z} - Y \\ \bar{Z}:XY - Z - \bar{Z} \\ \end{array}} I(XY;Q|\bar{Z}) \end{aligned}$$
(7)

where the minimum is taken over all RVs Q and \(\bar{Z}\). Cardinalities of the corresponding alphabets are bounded as \(|{\mathcal {Q}}| \le |{\mathcal {X}}||{\mathcal {Y}}|\), and \(|\bar{\mathcal {Z}} | \le |\mathcal {Z}|\) respectively. \({SK_c}(X;Y|Z)\) is bounded from below by the intrinsic information [3], that intuitively speaking, measures the correlation shared between Alice and Bob that Eve cannot access or destroy [2].

$$\begin{aligned} I(X;Y \downarrow Z) = \mathop {\min }\limits _{\bar{Z}:XY - Z - \bar{Z}} I(X;Y|\bar{Z}) \end{aligned}$$
(8)

where the cardinality of the alphabet \(\bar{\mathcal {Z}}\) of RV \(\bar{Z}\) is bounded as \(|\bar{\mathcal {Z}}| \le |\mathcal {Z}|\) [13]. Both \(I(X;Y \downarrow Z)\) and \({SK_c}(X;Y|Z)\) are known to be lockable [3, 4], i.e., can fall sharply by an arbitrary large amount on giving away a single bit to Eve.

3 Main Contributions

3.1 Wyner’s Conditional CI and the SK Cost of Formation

\({C_W}(X;Y)\) can be interpreted as the SK cost of creating a product distribution with Eve. Now consider Eve’s optimal channel \(p_{\bar{Z}|Z}\). To create a (public) correlation, Alice randomly samples \(\bar{Z}\) and publicly announces the value of \(\bar{Z}\) over a symmetric broadcast channel to Bob and Eve. Then the SK cost of creating the product distribution \(p_{XY|{\bar{Z}}}\) is \(C_W(X;Y|{\bar{Z}})\). In this section, we introduce the concept of protocol monotones [6, 1416] for axiomatizing the general properties of upper bounds on the SK rate and show that \(C_W(X;Y|\bar{Z})\) qualifies as such an upper bound and is a natural candidate for quantifying the SK cost of formation.

When distant parties wish to establish a SK by manipulating some set of private and public resources, it is natural to restrict attention to LOPC operations. Since the “resourcefulness” or “secrecy content” of the state is a non-local property that cannot increase under LOPC, this set of transformations is deemed as a free resource. Mathematically, resources can be quantified by monotones, real-valued functions of joint distributions that cannot increase under LOPC. LOPC monotones were first introduced in [16] as classical counterparts of entanglement or LOCC (local operations and classical communication) monotones to study the rate of resource conversion under LOPC. A resource cannot increase under LOPC operations by Alice and Bob. Since Eve, in her role as a malicious adversary is always assumed to operate optimally against Alice and Bob, the same resource cannot decrease under her LOPC operations [6, 16]. We define a monotone as follows.

Definition 3

For all jointly distributed RVs (XYZ), let \(\mathcal {M}(X;Y|Z)\) be a real-valued function of \(p_{XYZ}\). Then \(\mathcal {M}\) is a monotone if the following hold:

  1. (1)

    Monotonicity under local operations (LO) by Alice and Bob: Suppose Alice modifies X to \({\bar{X}}\) by sending X over a channel, characterized by \(p_{{\bar{X}}|{X}}\). Then \(\mathcal {M}\) can only decrease, i.e., for all jointly distributed RVs \((X,Y,Z,\bar{X})\) with \(\bar{X}:YZ - X - \bar{X}\) , \(\mathcal {M}(\bar{X};Y|Z)\) \(\le \) \(\mathcal {M}(X;Y|Z)\) , and likewise for Bob.

  2. (2)

    Monotonicity under public communication (PC) by Alice and Bob: Suppose Alice publicly announces the value of \(\widetilde{X}\). Then \(\mathcal {M}\) can only decrease, i.e., for all jointly distributed RVs \((X,Y,Z, \widetilde{X})\) with \(H(\widetilde{X}|X)=0\) , \(\mathcal {M}(X;Y\widetilde{X}|Z\widetilde{X})\) \(\le \) \(\mathcal {M}(X;Y|Z)\) , and likewise for Bob.

  3. (3)

    Monotonicity under local operations (LO) by Eve: Suppose Eve modifies Z to \(\bar{Z}\) by sending Z over a channel, characterized by \(p_{\bar{Z}|{Z}}\). Then \(\mathcal {M}\) can only increase, i.e., for all jointly distributed RVs \((X,Y,Z,\bar{Z})\) with \(\bar{Z}:XY - Z - \bar{Z}\) , \(\mathcal {M}(X;Y|\bar{Z})\) \(\ge \) \(\mathcal {M}(X;Y|Z)\).

  4. (4)

    Monotonicity under public communication (PC) by Eve: Suppose Eve publicly announces the value of \(\widetilde{Z}\). Then \(\mathcal {M}\) can only increase, i.e., for all jointly distributed RVs \((X,Y,Z,\widetilde{Z})\) with \(H(\widetilde{Z}|Z)=0\),, \(\mathcal {M}(\widetilde{Z}X;\widetilde{Z}Y|Z)\) \(\ge \) \(\mathcal {M}(X;Y|Z)\).

  5. (5)

    Additivity and Continuity: \(\mathcal {M}\) is additive on tensor products and is a semi-positive, continuous function of \(p_{XYZ}\). A stronger notion of asymptotic continuity requires that for two pmfs \({{p_{XYZ}}}\) , \({{q_{XYZ}}}\), if \(\mathsf {TV}({{p_{XYZ}}}, {{q_{XYZ}}})=\epsilon \) , then \(|\mathcal {M}({{p_{XYZ}}})-\mathcal {M}({{q_{XYZ}}})|\le \epsilon \log {d} + \delta (\epsilon )\) , where d is some constant that depends on \(|\mathcal {X}|,\;|\mathcal {Y}|\) and \(|\mathcal {Z}|\) and \(\delta (\epsilon )\) is any function that depends only on \(\epsilon \) with \(\delta (0)=0\).

If \(\mathcal {M}\) satisfies the conditions in Definition 3, then \(\mathcal {M}\) is an upper bound on the SK rate [14]. Upper bounds on the rate at which instances of a target primitive can be realized per invocation of the source primitive can be obtained by comparing the value of the monotone on the source and target states. Given the class of LOPC operations, suppose that the parties are able to convert n copies of \(p_{XYZ}\) into some realization of a distribution \(q'_{XYZ}\) which is close to m independent realizations of the target distribution \(q_{XYZ}\), i.e., \({p^{ \otimes n}}\mathop \rightarrow \limits ^{LOPC} q' \simeq {q^{ \otimes m}}\). Then by virtue of Property (5) in Definition 3, we have, \(\mathcal {M}({p^{ \otimes n}})=n\mathcal {M}(p)\ge \mathcal {M}(q')\simeq m\mathcal {M}(q)\), so that the optimal rate \(R(p \rightarrow q)\) at which transformations \({p^{ \otimes n}}\mathop \rightarrow \limits ^{LOPC} {q^{ \otimes m}}\) are possible is upper bounded as \(\tfrac{m}{n} \le \tfrac{\mathcal {M}({p})}{\mathcal {M}({q})}\) [16]. Thus if \(p_{SS{\varDelta }}^s\) denotes the distribution of a perfect secret bit with \(p_{SS{\varDelta }}^s(0,0,\delta )=p_{SS{\varDelta }}^s(1,1,\delta )=\tfrac{1}{2}\), then for any pmf \(q_{XYZ}\), \(S(X;Y||Z)=R(q \rightarrow p^s)\le \tfrac{I(X;Y \downarrow Z)}{I(S;S \downarrow \varDelta )} = I(X;Y \downarrow Z)\), since \(I(S;S \downarrow \varDelta )=1\), and \(I(X;Y \downarrow Z)\) is a monotone [3]. Likewise \(R(p^s \rightarrow q)\le \tfrac{I(S;S \downarrow \varDelta )}{I(X;Y \downarrow Z)}=\tfrac{1}{I(X;Y \downarrow Z)}\). Hence \(SK_c(X;Y|Z)=\tfrac{1}{R(p^s \rightarrow q)} \ge I(X;Y \downarrow Z)\) [3].

\(C_W(X;Y|Z)\) violates monotonicity under LO by EveFootnote 1 and thus fails to achieve an upper bound on the SK rate. To preserve monotonicity under LO by Eve, an additional minimization is required over all stochastic maps \({p_{\bar{Z}|Z}}\) that can be chosen by Eve for locally processing her observations. This implies a minimization over all Markov chains \(XY - Z - \bar{Z}\) which is tantamount to the simulation approximation of \((X^nY^nZ^n)\) upto a local degrading in \(Z^n\) in Definition 2 of the SK cost of formation. This yields a new quantity called Wyner’s intrinsic conditional CI that satisfies monotonicity under Eve’s LOPC operations.

$$\begin{aligned} {C_W}(X;Y \downarrow Z) = \mathop {\min }\limits _{\bar{Z}:XY - Z - \bar{Z}} {C_W}(X;Y|\bar{Z}) = \mathop {\min }\limits _{\begin{array}{c} Q:X - Q\bar{Z} - Y \\ \bar{Z}:XY - Z - \bar{Z} \\ \end{array}} I(XY;Q|\bar{Z}) \end{aligned}$$
(9)

The cardinality of the alphabet \(\bar{\mathcal {Z}}\) of \(\bar{Z}\) is bounded as \(|\bar{\mathcal {Z}}| \le |\mathcal {Z}|\). This can be shown following similar arguments as in [13] using Carathéodory’s theorem. From (6), we have \(|\mathcal {Q}| \le |\mathcal {X}||\mathcal {Y}|\). We now show that \({C_W}(X;Y \downarrow Z)\) is indeed a monotone and hence a valid upper bound on the SK rate.

Lemma 2

\({C_W}(X;Y \downarrow Z)\) is a monotone.

Proof

Let \(p_{\bar{Z}|Z}\) be the minimizer in \({C_W}(X;Y \downarrow Z)\). Then it suffices to show that \({C_W}(X;Y|\bar{Z})\) satisfies monotonicity under Alice and Bob’s LOPC operations. We shall require the following monotonicity inequalities: (a) \(H(Z|f(Y)) \ge H(Z|Y)\), (b) \(I(X;Y|f(X)Z) \le I(X;Y|Z)\). For all jointly distributed RVs \((XY\bar{Z}Q\bar{X})\) such that \(Y\bar{Z} - X - \bar{X}\) and \(\bar{X}-Q\bar{Z}-Y\), monotonicity under LO by Alice holds since,

$$ I({\bar{X}}Y;Q|\bar{Z})=H(Q|\bar{Z})-H(Q|{\bar{X}}Y\bar{Z})\mathop \le \limits ^{{\text {(a)}}}H(Q|\bar{Z})-H(Q|XY\bar{Z})=I(XY;Q|\bar{Z}),$$

and likewise for Bob. Similarly, for all jointly distributed RVs \((XY\bar{Z}Q\widetilde{X})\) such that \(H(\widetilde{X}|X)=0\), monotonicity under PC by Alice holds since,

$$ I(XY\widetilde{X};Q\widetilde{X}|\bar{Z}\widetilde{X}) = I(XY;Q|\bar{Z}\widetilde{X})\mathop \le \limits ^{{\text {(b)}}} I(XY;Q|\bar{Z}),$$

and likewise for Bob.

Additivity and continuity are valuable properties if the monotone is to provide information on the rate of transformations \({p^{ \otimes n}}\mathop \rightarrow \limits ^{LOPC} {q^{ \otimes m}}\) in the asymptotic limit \(n,m \rightarrow \infty \). It is easy to show that for independent triples \((X_1Y_1\bar{Z_1})\) and \((X_2Y_2\bar{Z_2})\), \(C_W(X_1X_2;Y_1Y_2|{\bar{Z_1}\bar{Z_2}})=C_W(X_1;Y_1|\bar{Z_1})+C_W(X_2;Y_2|\bar{Z_2})\). We do not target the stronger notion of asymptotic continuity since it is already known that the SK cost fails this property and admits locking [4].    \(\square \)

Theorem 3 gives the main result of this section.

Theorem 3

With unlimited public communication, \({SK_c}(X;Y|Z)={C_W}(X;Y\downarrow {Z})\). Furthermore, if \({p_{\bar{Z}|Z}}\) is the optimal stochastic map achieving the minimum in the characterization of \({C_W}(X;Y \downarrow Z)\), then \({C_W}(X;Y \downarrow Z)=I(X;Y \downarrow Z)\) iff there exists a pmf \(p_{Q'|XYZ\bar{Z}}\) s.t. \(H(Q'|X\bar{Z})=H(Q'|Y\bar{Z})=0\) and \(X-\bar{Z}Q'-Y\).

Proof

From (7), (9) and Lemma 2, the first equality is obvious. For the second equality, the “only if” part is trivial. For the “if” part, first note that

$$\begin{aligned} {C_W}(X;Y \downarrow Z)&= \mathop {\min }\limits _{\begin{array}{c} Q:X - Q\bar{Z} - Y \\ \bar{Z}:XY - Z - \bar{Z} \end{array}} I(XY;Q|\bar{Z})= \mathop {\min }\limits _{\begin{array}{c} Q:X - Q\bar{Z} - Y \\ \bar{Z}:XY - Z - \bar{Z} \end{array}} (I(Y;Q|X\bar{Z}) + I(X;Q|\bar{Z})) \\&\mathop = \limits ^{{\text {(a)}}} \text { }\mathop {\min }\limits _{\begin{array}{c} Q:X - Q\bar{Z} - Y \\ \bar{Z}:XY - Z - \bar{Z} \end{array}} (I(X;Y|\bar{Z})+I(Y;Q|X\bar{Z}) + I(X;Q|Y\bar{Z})), \end{aligned}$$

where (a) follows from writing \(I(X;Q|\bar{Z})\) as \(I(X;Y|\bar{Z})+I(X;Q|Y\bar{Z})-I(X;Y|Q\bar{Z})\), and noting that \(I(X;Y|Q\bar{Z})=0\). Then given jointly distributed RVs \((XYZ\bar{Z}Q)\) achieving the minimum in (9), if \(I(Y;Q|X\bar{Z})=I(X;Q|Y\bar{Z})=0\), then by Lemma 1, there exists a pmf \(p_{Q'|XYZ\bar{Z}}\) such that \(H(Q'|X\bar{Z})=H(Q'|Y\bar{Z})=0\), \(XY-Q'\bar{Z}-Q\) and \(I(XY;Q|\bar{Z})\le H(Q'|\bar{Z})\), with equality iff \(H(Q'|Q\bar{Z})=0\). Finally note that \(H(Q'|\bar{Z})\le I(X;Y|\bar{Z})\) with equality iff \(X-\bar{Z}Q'-Y\).    \(\square \)

3.2 Gács and Körner (GK) Conditional CI and the SK Rate

For the general source model (with arbitrary public discussion), calculation of the exact SK rate remains an open problem [13, 15]. Without any communication, the problem is still more complicated in that even the determination of probability distributions that allow for the distillation of SK remains an unsolved problem. GK showed that in a non-communicative model, common codes of a pair of discrete, memoryless correlated sources cannot exploit any correlation beyond a certain deterministic interdependence of the sources. Remarkably, they showed that the asymptotic case is no better than the zero error case and that \(C_{GK}(X;Y)\) depends only on the zero pattern of the underlying joint distribution \({p_{XY}}\). Intuitively, \({C_{GK}}(X;Y|Z)\) captures the most “explicit” form of secret CI, i.e., the maximum amount of SK that can be extracted without any communication. In this section, we construct simple distributions for which \({C_{GK}}(X;Y|Z)\) achieves a tight bound on the SK rate. We conjecture that \({C_{GK}}(X;Y|Z)\) quantifies the achievable SK rate for non-communicative key agreement models. We also comment on the lossless interconvertibility of secret correlations.

Example 1

Consider the distribution \(p_{XYZ}^1\) with \(\mathcal {X}=\mathcal {Y}=\mathcal {Z}=\{0,1,2,3\}\). We write \(p_{XYZ}^1(a,b,c)=(abc)\). Given \((000)=(011)=(101)=(110)=\tfrac{1}{8}\), and \((222)=(333)=\tfrac{1}{4}\). Graphically, \(p_{XYZ}^1\) is shown in the following table (with Z’s value given in parentheses): \(p_{XYZ}^1=\tfrac{1}{8}\left( {\begin{matrix}1(0)&{}1(1)&{}.&{}.\\ 1(1)&{}1(0)&{}.&{}.\\ .&{}.&{}2(2)&{}.\\ .&{}.&{}.&{}2(3)\end{matrix}}\right) \). Alice, Bob and Eve each have access to this table and many independent copies of X, Y and Z, respectively. For each independent random experiment generating \((X,Y,Z)\sim p_{XYZ}^1\), Eve can infer Alice and Bob’s values with complete certainty, when she receives either 2 or 3. When she receives either 0 or 1, she can only infer that Alice’s and Bob’s symbols are restricted to the upper left quadrant (i.e., the set \(\{0,1\}\)), but then in this range, X and Y are uniformly distributed. Clearly, Alice and Bob can share no secret. Now, consider the distributions \(p_{XYZ}^2=\tfrac{1}{8}\left( {\begin{matrix}1(0)&{}1(1)&{}.&{}.\\ 1(1)&{}1(0)&{}.&{}.\\ .&{}.&{}2(2)&{}.\\ .&{}.&{}.&{}2(2)\end{matrix}}\right) \), and \(p_{XYZ}^3=\tfrac{1}{8}\left( {\begin{matrix}1(0)&{}1(1)&{}.&{}.\\ 1(1)&{}1(0)&{}.&{}.\\ .&{}.&{}2(0)&{}.\\ .&{}.&{}.&{}2(1)\end{matrix}}\right) \), where Eve’s symbol set is successively depleted to \(\mathcal {Z}=\{0,1,2\}\) and \(\mathcal {Z}=\{0,1\}\), respectively. In the latter case, Alice and Bob can realize one perfect SK bit, since Eve can no longer infer anything about their quadrant information (upper left or lower right). This intuition is borne out by \({C_{GK}}(X;Y|Z)\), which evaluates to 0, 0.5 and 1, respectively, for \(p^1\), \(p^2\) and \(p^3\). \(p^3\) is resolvable but not conditionally resolvable. A distribution \(p^4\) that is conditionally resolvable but not resolvable is the following: \((000)=(100)=(010)=(110)=\tfrac{1}{18},\text { }(001)=(101)=(011)=(111)=\tfrac{1}{21},\text { } (032)=(042)=\tfrac{1}{15},\text { } (252)=\tfrac{1}{5},\text { } (220)=\tfrac{1}{9},\text { } (221)=\tfrac{1}{7}\). Finally, \(C_{GK}(X;Y|Z)=1\) for the following more general distribution \(p^5\) that is neither resolvable nor conditionally resolvable: \((000)=(011)=(020)=(101)=\tfrac{1}{10},\text { }(110)=(121)=\tfrac{1}{20},\text { }(230)=(331)=\tfrac{1}{4}\), where using arguments similar to the ones for \(p^3\), Alice and Bob can be shown to achieve one perfect SK bit.

Example 2

Consider the following sequence of distributions:

$$\begin{aligned} {({p_{XYZ}})_n}(x,y,z)&= {\left\{ \begin{array}{ll} \tfrac{1}{2n^2}, {\text { }}{\text {if}}{\text { }}x,y \in \{0,\ldots ,n-1\},{\text { }} z=x+y{\text { }}(\text {mod} n), \\ \tfrac{1}{2n}, {\text { }}{\text {if}}{\text { }}x \in \{n,\ldots ,2n-1\},{\text { }} y=x,{\text { }}z=x{\text { }}(\text {mod} n). \end{array}\right. }\\ {({q_{XYZ}})_n}(x,y,z)&= {\left\{ \begin{array}{ll} \tfrac{1}{{\log n}}{({p_{XYZ}})_n},{\text { }}{\text {if}}{\text { }} x \ne \varDelta ,{\text { }}y \ne \varDelta ,{\text { }}z \ne \varDelta , \\ 1 - \tfrac{1}{{\log n}},{\text { }}{\text {if}}{\text { }} x = y = z = \varDelta , \end{array}\right. } \end{aligned}$$

where \({({q_{XYZ}})_n}\) is derived from \({({p_{XYZ}})_n}\) by extending the symbol sets \(({\mathcal {X}},{\mathcal {Y}},{\mathcal {Z}})\) to include an extra symbol \(\varDelta \). Renner and Wolf [3] showed that \({({q_{XYZ}})_n}\) has asymptotic bound information, i.e., \({({q_{XYZ}})_n}\) is asymptotically non-distillable \((S({X_{(n)}};{Y_{(n)}}||{Z_{(n)}}) = \tfrac{1}{{\log n}} \rightarrow 0\), as \(n \rightarrow \infty )\), and yet cannot be created by LOPC, since \(SK_c({X_{(n)}};{Y_{(n)}}|{Z_{(n)}}) \ge I({X_{(n)}};{Y_{(n)}} \downarrow {Z_{(n)}}) = \tfrac{1}{{\log n}}(1 + \tfrac{1}{2}\log n) > \tfrac{1}{2}\) [3]. Omitting the index n, for a given Z, the maximal common RV of the pair (XY) has the pmf \({p_{Q_*}}(0) = \tfrac{1}{{2\log n}},{\text { }}{p_{Q_*}}(1) = 1 - \tfrac{1}{{\log n}},{\text { }}{p_{Q_*}}(i) = \tfrac{1}{{2n\log n}},{\text { }}i = 2,...,n + 1\), so that \(C_{GK}(X;Y|Z)=H(Q_*|Z)=\tfrac{1}{{\log n}}\), thus achieving the SK rate.

In both the examples above, no assumptions have been made on the nature of the communication protocol (or its lack thereof) between Alice and Bob. For a non-communicative SK agreement model, i.e. a restricted key agreement model where no communication is allowed between Alice and Bob, let \(S_{0-\text {comm}}(X;Y||Z)\) denote the maximum attainable rate at which a SK can be extracted by Alice (knowing \(X^n\)) and Bob (knowing \(Y^n\)) about which Eve (knowing \(Z^n\)) has virtually no information. As usual, \((X^n,Y^n,Z^n)\) are independent repeated realizations of the random experiment \(p_{XYZ}\).

Conjecture 4

For non-communicative SK agreement models, \(S_{0-\text {comm}}(X;Y||Z)\) \(={C_{GK}}(X;Y|Z)\). Furthermore, if \(p_{XYZ}\) is conditionally resolvable, then

$$S_{0-comm}(X;Y||Z)={C_{GK}}(X;Y|Z)=I(X;Y|Z).$$

4 Concluding Remarks

In summary, we have presented two results. The first result demonstrates the power of the framework of resource monotones for axiomatizing the general properties of upper bounds on the SK rate. We showed that \(C_W(X;Y|Z)\) violates monotonicity under LO by Eve, which can be used to bootstrap the definition of the SK cost of simulating the triple (XYZ) up to a local degrading of Z. In the past, a similar approach has been put to direct practical use for deriving strong bounds on the SK rate [15]. Given many independent copies of a source distribution (\(q_{XYZ}\)) and a target distribution of a perfect secret bit (\(p_{SS{\varDelta }}^s\)), reversible conversion of \(q_{XYZ}\) and \(p_{SS{\varDelta }}^s\) is possible iff \(R(q \rightarrow p^s)R(p^s \rightarrow q)=1\), i.e., iff \(S(X;Y||Z)=I(X;Y \downarrow Z)\) and \(I(X;Y \downarrow Z)=SK_c(X;Y|Z)\). In Theorem 3, we have given necessary and sufficient conditions for achieving the second equality. More generally, monotones can be used to derive upper bounds on the asymptotic rate of conversion of \(q_{XYZ}\) to any other distribution \(q_{X'Y'Z'}\) (e.g., one which is relatively less favorable to Eve). Thus, resource theories hold promise in capturing a general calculi of secret correlations.

In the second part, we constructed simple distributions for which the conditional Gács and Körner CI achieves a tight bound on the SK rate. The sequence of distributions \({({q_{XYZ}})_n}\) in Example 2 was originally constructed by Renner and Wolf [3] to show that there exists sequences of distributions with asymptotic bound information, i.e., asymptotically non-distillable correlations with positive SK cost. This is the best that has been shown so far for the bipartite case. For more than two parties, the possibility of creating different bipartitions across the honest parties immensely simplifies the problem and, indeed, multipartite bound information has been shown to exist [17]. Constructing distributions that can show the existence of bipartite bound information remains an open problem and a scope for future work. Another problem of independent interest is to consider single shot versions of the SK cost of formation and intrinsic information.