Spectral approach to the communication complexity of multi-party key agreement

Geoffroy Caillat-Grenier,Andrei Romashchenko
DOI: https://doi.org/10.4230/LIPIcs.STACS.2024.22
2023-09-29
Abstract:We propose a linear algebraic method, rooted in the spectral properties of graphs, that can be used to prove lower bounds in communication complexity. Our proof technique effectively marries spectral bounds with information-theoretic inequalities. The key insight is the observation that, in specific settings, even when data sets $X$ and $Y$ are closely correlated and have high mutual information, the owner of $X$ cannot convey a reasonably short message that maintains substantial mutual information with $Y$. In essence, from the perspective of the owner of $Y$, any sufficiently brief message $m=m(X)$ would appear nearly indistinguishable from a random bit sequence. We employ this argument in several problems of communication complexity. Our main result concerns cryptographic protocols. We establish a lower bound for communication complexity of multi-party secret key agreement with unconditional, i.e., information-theoretic security. Specifically, for one-round protocols (simultaneous messages model) of secret key agreement with three participants we obtain an asymptotically tight lower bound. This bound implies optimality of the previously known omniscience communication protocol (this result applies to a non-interactive secret key agreement with three parties and input data sets with an arbitrary symmetric information profile). We consider communication problems in one-shot scenarios when the parties' inputs are not produced by any i.i.d. sources, and there are no ergodicity assumptions on the input data. In this setting, we found it natural to present our results using the framework of Kolmogorov complexity.
Information Theory,Discrete Mathematics
What problem does this paper attempt to address?
The problem that this paper attempts to solve is the communication complexity problem in multi - party key agreements. Specifically: - **Problem Background**: In multi - party key agreements, multiple parties (for example, Alice, Bob and Charlie) need to exchange information to generate a common secret key. This process needs to minimize the amount of communication while ensuring information security. The security of information requires that even if a third party (for example, Eve) can intercept all communication messages, it cannot obtain any useful information about the finally generated key. - **Research Objective**: The main objective of the paper is to establish the lower bound of communication complexity in multi - party key agreements, especially in the case of information - theoretic security (that is, not relying on computational complexity assumptions). The author proposes a method based on graph spectral theory, combined with information - theoretic inequalities, to prove these lower bounds. - **Main Results**: - For the one - round protocol (simultaneous message model) of three - party, the paper establishes an asymptotically tight lower bound of communication complexity. - This lower bound shows that in some specific cases, even for highly correlated data sets with high mutual information, it is difficult for one party to send a message that is both short and retains a large amount of mutual information with the data set of another party. - Specifically, for the three - party input data sets with symmetric information configuration, the paper proves that the lower bound of communication complexity is \( C(x,y,z)-\frac{1}{2}(I(x:y|z)+I(x:z|y)+I(y:z|z)) - I(x:y:z)-O(\delta)-O(\log n)\). - **Method Innovation**: The paper combines the Expander Mixing Lemma in graph spectral theory and information - theoretic inequalities and proposes a new proof technique. This method is not only applicable to cryptographic problems, but also can be applied to other problems not involving cryptography. - **Application Scenarios**: This research result is of great significance in various scenarios such as quantum key distribution, key agreements based on correlated information (such as biometric information, noise channel observations, etc.), and finite - storage models. In general, this paper provides an important theoretical basis for understanding and optimizing the communication efficiency of multi - party key agreements by introducing new mathematical tools and methods.