The Private and Public Correlation Cost of Three Random Variables With Collaboration

In this paper, we consider the problem of generating arbitrary three-party correlations from a combination of public and secret correlations. Two parties-called Alice and Bob-share perfectly correlated bits that are secret from a collaborating third party, Charlie. At the same time, all three parties have access to a separate source of correlated bits, and their goal is to convert these two resources into multiple copies of some given tripartite distribution P(XYZ). We obtain a single-letter characterization of the tradeoff between public and private bits that are needed to achieve this task. The rate of private bits is shown to generalize Wyner's classic notion of common information held between a pair of random variables. The problem we consider can be contrasted fruitfully with the task of secrecy formation, in which P(XYZ) is generated using public communication and local randomness but with Charlie functioning as an adversary instead of a collaborator. We describe in detail the differences between the collaborative and adversarial scenarios.

[1]  Karol Horodecki,et al.  Information Theories with Adversaries, Intrinsic Information, and Entanglement , 2005 .

[2]  Rudolf Ahlswede,et al.  Strong converse for identification via quantum channels , 2000, IEEE Trans. Inf. Theory.

[3]  Imre Csiszár,et al.  Common randomness and secret key generation with a helper , 2000, IEEE Trans. Inf. Theory.

[4]  R. F. Werner,et al.  Quantum lost and found , 2002, quant-ph/0209025.

[5]  Andreas J. Winter,et al.  Secret, public and quantum correlation cost of triples of random variables , 2005, Proceedings. International Symposium on Information Theory, 2005. ISIT 2005..

[6]  Paul W. Cuff,et al.  Communication requirements for generating correlated random variables , 2008, 2008 IEEE International Symposium on Information Theory.

[7]  Sergio Verdú,et al.  Approximation theory of output statistics , 1993, IEEE Trans. Inf. Theory.

[8]  Renato Renner,et al.  New Bounds in Secret-Key Agreement: The Gap between Formation and Secrecy Extraction , 2003, EUROCRYPT.

[9]  Sergio Verdú,et al.  New results in the theory of identification via channels , 1992, IEEE Trans. Inf. Theory.

[10]  Victor Klee On a theorem of Dubins , 1963 .

[11]  M. Horodecki,et al.  The asymptotic entanglement cost of preparing a quantum state , 2000, quant-ph/0008134.

[12]  丸山 徹 Convex Analysisの二,三の進展について , 1977 .

[13]  Imre Csiszár,et al.  Information Theory - Coding Theorems for Discrete Memoryless Systems, Second Edition , 2011 .

[14]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[15]  Aaron D. Wyner,et al.  The common information of two dependent random variables , 1975, IEEE Trans. Inf. Theory.

[16]  H. Witsenhausen Values and Bounds for the Common Information of Two Discrete Random Variables , 1976 .

[17]  John A. Smolin,et al.  Entanglement of assistance and multipartite state distillation , 2005 .

[18]  Paul Cuff,et al.  Communication in networks for coordinating behavior , 2009 .

[19]  Peter W. Shor,et al.  Entanglement-assisted capacity of a quantum channel and the reverse Shannon theorem , 2001, IEEE Trans. Inf. Theory.

[20]  Rudolf Ahlswede,et al.  Common randomness in information theory and cryptography - I: Secret sharing , 1993, IEEE Trans. Inf. Theory.

[21]  Andreas J. Winter,et al.  The Quantum Reverse Shannon Theorem and Resource Tradeoffs for Simulating Quantum Channels , 2009, IEEE Transactions on Information Theory.

[22]  M. Lewenstein,et al.  Quantum Entanglement , 2020, Quantum Mechanics.

[23]  U. Maurer,et al.  Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.

[24]  Andreas Winter On environment-assisted capacities of quantum channels , 2005 .

[25]  Rudolf Ahlswede,et al.  On Concepts of Performance Parameters for Channels , 2006, GTIT-C.