Mutual Dependence for Secret Key Agreement The MIT Faculty has made this article openly available. Please share how this access benefits you. Your story matters. Citation Chung Chan, and Lizhong Zheng. “Mutual dependence for secret key agreement.” IEEE, 2010. 1-6. Web. 28 Oct. 2011. © 2010 Institute of Electrical and Electronics Engineers As Published http://dx.doi.org/ 10.1109/CISS.2010.5464805 Publisher Institute of Electrical and Electronics Engineers Version Final Published Version Accessed Thu May 26 09:57:19 EDT 2016 Citable Link http://hdl.handle.net/1721.1/66685 Terms of Use Article is made available in accordance with the publisher's policy and may be subject to US copyright law. Please refer to the publisher's site for terms of use. Detailed Terms 1 Mutual Dependence for Secret Key Agreement Chung Chan and Lizhong Zheng Abstract—A mutual dependence expression is established for the secret key agreement problem when all users are active. In certain source networks, the expression can be interpreted as certain notions of connectivity and network information flow. In particular, the secrecy problem can be mapped to a new class of network coding problems with selectable links and undirected broadcast links. For such networks, the secrecy capacities serve as upper bounds on the maximum network throughputs, while the network coding solutions can be used for secret key agreement. Index Terms—Secret key agreement, mutual dependence, network coding, partition connectivity, supermodularity I. M UTUAL D EPENDENCE We first consider a measure of correlation among a set of random variables, and establishes its operational meaning with the problems of secret key agreement and communication for omniscience in [2]. In information theory, the dependence between any two random variables is captured by the mutual information[3], I(Z1 ∧ Z2 ) := D(PZ1 Z2 kPZ1 PZ2 ) = H(Z1 ) − H(Z1 |Z2 ) (1.1) where PZ1 Z2 denotes the distribution of Z1 and Z2 , D(·k·) is the information divergence, and H(·) is the entropy measure.[3] It has various operational meanings spanning over the source and channel coding theories. A heuristically appealing extension[2] to the multivariate case with more than two random variables is the following mutual dependence expression. distribution to the product distribution of certain marginals. We will establish the following operational meaning for (1.2) in the problem of secret key agreement (SK) and communication for omniscience (CO) considered in [2].1 Operational meaning of mutual dependence: The mutual dependence expression I(ZV ) equals SK: the maximum rate (secrecy capacity) of secret key that can be generated from the discrete multiple memoryless source (DMMS) ZV with unlimited authenticated public discussion, and CO: the maximum savings in rate, below H(ZV ), of the public discussion required to attain omniscience of the DMMS ZV . i.e. H(ZV ) subtracted by the smallest rate of communication for omniscience. We have considered here the special case when all terminals are active in the sense that they all want to share the secret in the SK problem, and attain omniscience in the CO problem. Theorem 1.1 Given a finite ground set V : |V | ≥ 2, the mutual dependence in (1.2) satisfies, X I(ZV ) = H(ZV ) − max λB H(ZB |ZB c ) (1.3) λ∈Λ B∈F V where F := 2 \ {V }, Λ is defined as the collection of fractional partitions P λ := (λB : B ∈ F ) of V , i.e. λB ≥ 0 for all B ∈ F and B∈F :i∈B λB = 1 for all i ∈ V . 2 Definition 1.1 (Mutual Dependence) For any finitely-valued random vector ZV := (Zi : i ∈ V ) with |V | ≥ 2, the mutual dependence of ZV is defined as, ! Y 1 I(ZV ) := min D PZV PZC (1.2) P∈Π |P| − 1 This establishes the result since the expression on the R.H.S. of (1.3) bears the desired operation meaning by [2]. where Π is the collection of set-partitions P of V into at least 2 non-empty sets. 2 with the convention h(∅) = 0. We will use the following wellknown[4] supermodularity property of h to prove the theorem. Example 1.1 Mutual dependence (1.2) reduces to the usual mutual information when |V | = 2. i.e. I(Z{1,2} ) = I(Z1 ∧Z2 ). With V := [3] := {1, 2, 3}, we have I(Z[3] ) is the minimum P of I(Z1 ∧ Z2 Z3 ), I(Z2 ∧ Z1 Z3 ), I(Z3 ∧ Z1 Z2 ), and 1 [ 2 i∈[3] H(Zi ) − H(Z[3] )]. 2 Subclaim 1.1A h is supermodular, i.e. P ROOF (T HEOREM 1.1) Define h : F 7→ R as h(B) := H(ZB |ZB c ) ∀B ∈ F (1.4) C∈P (1.1) and (1.2) are similar in the sense that both can be expressed in terms of the information divergence from the joint This work is supprted in part by Project. #MMT-p2-09 of the Shun Hing Institute of Advanced Engineering, The Chinese University of Hong Kong. Manuscript written for CISS 2010. Related work at [1]. Chung Chan (chungc@mit.edu) is with Shun Hing Institute of Advanced Engineering, The Chinese University of Hong Kong, and Research Laboratory of Electronics at MIT, Massachusetts Institute of Technology. Lizhong Zheng is with Research Laboratory of Electronics at MIT, Massachusetts Institute of Technology. 978-1-4244-7417-2/10/$26.00 ©2010 IEEE h(B1 ) + h(B2 ) ≤ h(B1 ∩ B2 ) + h(B1 ∪ B2 ) (1.5) for all B1 , B2 ∈ F : B1 ∩ B2 , B1 ∪ B2 ∈ F . C P ROOF (S UBCLAIM 1.1A) Consider proving the non-trivial case where B1 and B2 are non-empty. We have the positivity of mutual information that, I(ZB1c ∧ ZB2c |ZB1c ∩B2c ) ≥ 0 =⇒ H(ZB1c ) + H(ZB2c ) ≥ H(ZB1c ∪B2c ) + H(ZB1c ∩B2c ) 1 More generally, there is a duality that C CR (R) = CS (R) + R where CCR (R) and CS (R) are the common randomness and secrecy capacities respectively under the same rate constraint R on public discussion and the same source model. (See [1] for details) 2 (1.5) follows since h(B) = H(ZV ) − H(ZB c ). J By the Strong Duality Theorem[5], the maximization in (1.3) is equal to its linear programming dual, X minimize ri (1.6a) i∈V subject to X ri ≥ h(B) ∀B ∈ F i.e. any set in B that contains i also contains j. Using this simplification, it is easy to see that ∼R satisfies the defining properties of an equivalence relation: • Reflexivity: R is reflexive since i ∈ Ci trivially for i ∈ V . • Transitivity: Suppose i ∼R j and j ∼R k for some i, j, k ∈ V . Then, (1.6b) {B ∈ B : i ∈ B} ⊆ {B ∈ B : j ∈ B} ⊆ {B ∈ B : k ∈ B} i∈B The supermodularity property of h translates to the following property on the tight relations of the dual problem. Subclaim 1.1B For any feasible solution r to the dual linear program (1.6), and B1 , B2 ∈ F : B1 ∩ B2 , B1 ∪ B2 ∈ F , if B1 and B2 are tight constraints, i.e. X r = h(Bj ) for j = 1, 2 (1.7a) i∈Bj • which implies i ∼R k as desired. Symmetry: suppose to the contrary that i ∼R j but j 6∼R i for some i, j ∈ V . Then, {B ∈ B : i ∈ B} ( {B ∈ B : j ∈ B} This implies, by definition (1.8) of B that X X λ∗B < λ∗B B3i then B1 ∪ B2 is also a tight constraint, X ri = h(B1 ∪ B2 ) (1.7b) i∈B1 ∪B2 n.b. B1 ∩ B2 is also tight but we do not need it for the proof of Theorem 1.1. C P ROOF (S UBCLAIM 1.1B) Since B1 ∪ B2 ∈ F , we immediP ately have i∈B1 ∪B2 ri ≥ h(B1 ∪ B2 ) by (1.6b). The reverse inequality can be proved as follows. X X X X ri = ri + ri − ri i∈B1 ∪B2 i∈B1 i∈B2 i∈B1 ∩B2 ≤ h(B1 ) + h(B2 ) − h(B1 ∩ B2 ) (b) ≤ h(B1 ∪ B2 ) where (a) is by (1.7a) and (1.6b) on B1 ∩ B2 ∈ F , and (b) is Pby Subclaim 1.1A. With a similar argument, we also have J i∈B1 ∩B2 ri = h(B1 ∩ B2 ). Let λ∗ be an optimal solution to the maximization in (1.3).2 Define its support set as, and the corresponding partition of V as, n[ c o P ∗ := {B ∈ B : B 63 i} : i ∈ V which is the desired contradiction since both sides equal 1 by the definition of Λ in Theorem (1.1). Finally, to argue that |P ∗ | ≥ 2, note that B 6= ∅ since P ∗ B∈F λB > 0. Since any B ∈ F satisfies B 6= V , we have Ci 6= V for all i ∈ V as desired. J The supermodularity of h implies the following property on every part of P ∗ . Subclaim 1.1D For any optimal r∗ to the dual problem (1.6), X ri∗ = h(C c ) ∀C ∈ P ∗ (1.10) C i∈C c (a) B := {B ∈ F : λ∗B > 0} B3j (1.8) (1.9) Subclaim 1.1C P ∗ in (1.9) belongs to Π in Definition 1.1. C P ROOF (S UBCLAIM 1.1D) P By the Complementary Slackness Theorem[5, Theorem 5.4], i∈B ri∗ = h(B) for all B ∈ B. By Subclaim 1.1B, for all i ∈ V , we have [ X {B ∈ B : B 63 i} ri∗ = h S i∈ {B∈B:B63i} which gives the desired equality (1.10) under (1.9). This completes the proof since the Primal/Dual Optimality Criteria[5, Theorem 5.5] implies (1{B c ∈ P ∗ }/(|P ∗ | − 1) : B ∈ F ) is an optimal solution in Λ. More precisely, for all feasible r to the dual (1.6), and P ∈ Π, X H(ZV ) − max λB H(ZB |ZB c ) λ∈Λ (a) ≤ H(ZV ) − P ROOF (S UBCLAIM 1.1C) Define the relation R on V as, i ∼R j ⇐⇒ i ∈ Cj for i, j ∈ V S c where Ci := ( {B ∈ B : B 63 i}) . By definition (1.9), P ∗ = {Ci : i ∈ V }. To show that P ∗ is a partition of V , it suffices to show that ∼R is an equivalence relation on V as follows. i ∼R j ⇐⇒ {B ∈ B : B 63 i} ⊇ {B ∈ B : B 63 j} ⇐⇒ {B ∈ B : i ∈ B} ⊆ {B ∈ B : j ∈ B} 2 λ∗ exists or equivalently Λ is non-empty. For example, λ {i} = 1 for i ∈ V is a fractional partition in Λ. For the more general case considered in Theorem 3.1, Λ may be empty. J B∈F X ri = H(ZV ) − i∈V X X 1 ri |P| − 1 c X 1 ≤ H(ZV ) − H(ZC c |ZC ) |P| − 1 C∈P ! X 1 = H(ZC ) − H(ZV ) |P| − 1 C∈P i∈C (b) by (1.6b) C∈P When we set r to an optimal solution r∗ , (a) is satisfied with equality by the Strong Duality Theorem. When we also set P to P ∗ , which is valid by Subclaim 1.1C, (b) is also satisfied with equality by Subclaim 1.1D. This gives the desired equality (1.3) and completes the proof of Theorem 1.1. 3 II. I NTERPRETATION VIA E MULATED S OURCE N ETWORK In this section, we will show that under certain classes of source networks, we can interpret mutual dependence (1.2) as certain notions of connectivity, and more concretely as the amount of information flow in certain types of networks. To make the notion of “flow” explicit, we consider the following class of source networks. Definition 2.1 (Emulated source network) Terminal i ∈ V observes Zi = (Xi , Yi ) such that, ! Y PXV YV = PXi PYi |XV (2.1) A. Interference network Definition 2.2 (Interference network) Given a hypergraph H := (V, E, φ) and a finite additive group (G, +) of order q, terminal i ∈ V observes, Zi := {Zei : e ∈ E, i ∈ φ(e)} where Zei for i ∈ V and e ∈ E are random variables taking values from G such that, 1) Zeφ(e) := (Zei : i ∈ φ(e)) for e ∈ E are independent, and 2) for all e ∈ E X Zei = 0 (2.4) i∈φ(e) i∈V This can be viewed as a source emulated by having terminal i ∈ V send Xi independently over a channel that returns Yi = fi (XV , Ni ) to terminal i, where fi is deterministic and Q Ni ’s are independent channel noises that satisfy PNV |XV = i∈V PNi . 3 2 Proposition 2.1 The mutual dependence (1.2) of the emulated source network in Definition 2.1 is, X 1 I(XC c ∧ YC |XC ) P∈Π |P| − 1 I(ZV ) = min (2.2) C∈P which is also the secrecy capacity when all terminals are active by Theorem 1.1. 2 Q P ROOF For all P ∈ Π, D(PXV YV k C∈P PXC YC ) equals, X H(XC YC ) − H(XV YV ) C∈P = X [H(XC ) + H(YC |XC )] − H(XV ) − H(YV |XV ) C∈P = X C∈P (2.3) [H(YC |XC ) − H(YC |XV )] {z } | and for all j ∈ φ(e), Zeφ(e)\{j} is uniformly distributed over G|φ(e)|−1 . 2 Proposition 2.2 The mutual dependence of the interference network in Definition 2.2 is (log q)p + (H) where p + (H) is the strength of H defined as, P |δ + ∗ (C)| + p (H) := min C∈P H (2.5a) P∈Π |P| − 1 |δH (P)| = min (2.5b) P∈Π |P| − 1 where H ∗ := (V, E, φ, ρ) is any star hypergraph of H, + δH ∗ (C) := {e ∈ E : ρ(e) ∈ C 6⊇ φ(e)} δH (P) := {e ∈ E : ∀C ∈ P, C 6⊇ φ(e)} which are the set of outgoing edges of C and crossing edges of P respectively. 2 P ROOF The interference network is a special case of the emulated source network in Definition 2.1 with, Yi := (Zei : e ∈ E, i = ρ(e)) Xi := (Zei : e ∈ E, i ∈ φ(e) \ {ρ(e)}) =I(XC c ∧YC |XC ) P where the last C∈P H(XC ) = P equality is by (2.1) that H(XV ) and C∈P H(YC |XV ) = H(YV |XV ). I(XC c ∧ YC |XC ) is intuitively the flow of information from C c to C. For a more concrete interpretation, we will consider some specific classes of networks for which the dependency among the observations can be abstracted by a hypergraph. Hypergraph: A hypergraph H := (V, E, φ) is defined by the mapping φ : E 7→ 2V \ {∅} from an edge e to a non-empty subset φ(e) of the vertices. The star hypergraph[6] H ∗ := (V, E, φ, ρ) of H has an additional mapping ρ : E 7→ V from an edge e to a root node ρ(e) ∈ φ(e) for the edge. 3 This pure source emulation approach to SK when terminals are given a channel instead of a source can sometimes be optimal. For instance, uniform input is optimal for finite linear channel Yi = Mi (XV , Ni ) for i ∈ V where Mi is a homomorphism between finite abelian groups and Ni ’s are arbitrarily correlated noise. This covers the interference and broadcast networks to be defined later. (See [1] for details) (2.6) (2.7) where ρ is an arbitrarily chosen orientation of H. We have, + I(XC c ∧ YC |XC ) = H(YC |XC ) = |δH ∗ (C)| X X X + |δH 1{C 6⊇ φ(e)} = |δH (P)| ∗ (C)| = C∈P e∈E C3ρ(e) which completes the proof with Proposition 2.1. + The strength p (H) of H has the following immediate interpretation of partition connectivity. Partition connectivity[7][8]: p + (H) is the maximum rational number x ∈ Q such that H is x-partition-connected, i.e. dx(k − 1)e edges need to be removed from H to yield k or more disconnected components for any k ∈ [|V |]. Each edge in H corresponds to a link of secret information flow with the following linear public discussion scheme. 4 Hyperedge as selectable link: Given an edge e, select a sender i ∈ φ(e) and a receiver j ∈ φ(e). Have the remaining terminals k ∈ φ(e) \ {i, j} publicly reveal Zek . Then, sender i can use Zei as a secret key to encrypt an independent secret M ∈ G into a public message (cryptogram) M + Zei . By (2.4), receiver j can perfectly recover Zei from the public messages Zeφ(e)\{i,j} . Since Zeφ(e)\{j} is uniformly distributed, the key is perfectly secret, i.e. I(Zei ∧ Zeφ(e)\{i,j} ) = 0. Thus, M is also perfectly secret and recoverable by j. We effectively have a private independent link from i to j with unit (log q bits) capacity. Viewing each edge as a private link with a selectable sender and receiver, the terminals can agree on a common secret key, simply by broadcasting it through the resulting network. Thus, the secret key agreement problem turns into a broadcast network coding problem with selectable links. Definition 2.3 (Network with selectable links) A network with selectable links defined by the hypergraph H = (V, E, φ) is used at each time as follows: for each edge e ∈ E, a sender i ∈ φ(e) can be selected to send a unit (log q bits) of information noiselessly to any chosen receiver j ∈ φ(e). 2 This network coding approach to secret key agreement is indeed optimal. i.e. the maximum throughput of the network attains the secrecy capacity, as a consequence of the tree packing result[7] of Tutte and Nash-Williams and its extension[8][6] to hypergraphs summarized below. Proposition 2.3 Given a hypergraph H := (V, E, φ), let n := min{i ∈ [|V |] : ip + (H) ∈ N} and H̃ := (V, Ẽ, φ̃) be the nextended hypergraph with Ẽ := {(e, t) : e ∈ E, t ∈ [n]} φ̃(ẽ) := φ(e) (2.8a) ∀ẽ ∈ Ẽ, e ∈ E : ∃t ∈ [n], ẽ = (e, t) (2.8b) Then, n ≤ |V | − 1, p + (H̃) = np + (H) by (2.5), and 1) H̃ can be represented by a graph G := (V, Ẽ, θ) in the following sense: p + (G) = p + (H̃) and for all e ∈ E θ(e) ⊆ φ(e) : 1 ≤ |θ(e)| ≤ 2 2) Up to p + (G) edge-disjoint spanning trees can be packed in G. i.e. there exists spanning trees Tj := (V, Ẽj , θ) for j ∈ [p + (G)] with disjoint edge sets Ẽj ⊆ Ẽ. 3) For all optimal P ∗ ∈ Π that attainsSthe minimum in (2.5b) and any excess edge ẽ∗ ∈ Ẽ \ j∈[p + (G)] Ẽj not used in a maximal tree packing, ∃C ∈ P ∗ , C ⊇ φ̃(ẽ∗ ) 2 P ROOF 1) follows from [6, Lemma 3.1 and Theorem 4.2, 5.1]. 2) follows from the Disjoint Tree Theorem[7, Corollary 51.1a] of Tutte and Nash-Williams. 3) Suppose to the contrary that for some optimal P ∗ and excess edge ẽ∗ , we have C 6⊆ φ̃(ẽ∗ ) for all C ∈ P ∗ . |δH̃ (P ∗ )| = {ẽ ∈ Ẽ : ∀C ∈ P ∗ , C 6⊇ φ̃(ẽ)} [ (a) Ẽj : ∀C ∈ P ∗ , C 6⊇ φ̃(ẽ) > ẽ ∈ + j∈[p (G)] (b) =(|P ∗ | − 1)p + (G) where (a) is by excluding ẽ∗ and (b) is because each spanning tree Tj contributes (|P ∗ | − 1) distinct crossing edges. Substituting p + (G) = np + (H) and |δH̃ (P ∗ )| = n|δH (P)| into the last inequality, we have the desired contradiction to the optimality of P ∗ . Since every spanning tree packed in H supports one unit of secret information flow from any designated root terminal to all other terminals, the tree packing result implies that p + (H) units of secret key can be broadcast to all terminals in total, acheiving the secrecy capacity. We now have the desired interpretation of mutual dependence as the secret information flow in a broadcast session of a network with selectable links. The optimal partition P ∗ to (2.5b) also has the intuitive meaning as classes of wellconnected terminals: two terminals must be in the same class in any optimal P ∗ if there is an excess private link between them. This connects and extends the results of [6][8][9][10]. Theorem 2.1 Given hypergraph H with strength p + (H) defined in (2.5), let CN,sl be the maximum throughput of a broadcast session of the delay-free network with selectable links defined in Defintion 2.3, and CS,if be the secrecy capacity of the interference network defined in Definition 2.2, then CN,sl = CS,if = (log q)p + (H) Furthermore, the maximum throughput and secrecy capacity can be attained non-asymptotically with delay at most |V |−1. The maximum throughput, in particular, can be achieved by routing. 2 Example 2.1 For the interference network defined in Definition 2.2, let G be the binary field F2 , and H := (V, E, φ) be the hypergraph on V = [3] with edge E := {123} and φ(123) = {1, 2, 3}. From (2.3), Z3 = Z1 + Z2 . Since p + (H) = 1/2, H can be extended as described in Proposition 2.3 to H̃ := (V, Ẽ, φ) with n = 2, and represented by the graph G := (V, Ẽ, θ) that can be maximally packed with p + (G) = 1 spanning tree T1 := (V, Ẽ1 , θ) where, Ẽ = Ẽ1 := {(123, 1), (123, 2)} θ((123, 1)) := {1, 2} and θ((123, 2)) := {1, 3} Thus, one secret key bit K can be propagated from terminal 1 through the tree network T1 to terminal 2 and 3. (123,1) In particular, we can have K set to Z1 and the public (123,1) (123,2) (123,2) (123,1) messages Z1 + Z1 , Z2 and Z3 revealed by terminal 1, 2 and 3 respectively. Terminal 2 and 3 can (123,1) (123,1) recover K by the linear operations Z2 + Z3 and (123,1) (123,2) (123,1) (123,2) Z3 + Z2 + (Z1 + Z1 ) respectively. K is (123,1) perfectly secret because Z1 is independent of the public messages. 2 5 B. Broadcast Network We now show another class of emulated source networks for which the mutual dependence has a different interpretation of connectivity, and can be mapped to a network coding problem with undirected broadcast links. Definition 2.4 (Broadcast Network) Given H := (V, E, φ) and a finite field Fq of order q, terminal i ∈ V observes, Zi := {Ze : e ∈ E, i ∈ φ(e)} (2.9) |E| where (Ze : e ∈ E) is uniformly distributed over Fq . 2 Proposition 2.4 The mutual dependence of the broadcast network in Definition 2.4 is (log q)p − (H) where, P |δ − ∗ (C)| − (2.10a) p (H) := min C∈P H P∈Π |P| − 1 P (|πP (φ(e))| − 1) = min e∈E (2.10b) P∈Π |P| − 1 H ∗ := (V, E, φ, ρ) is any star hypergraph of H, − c δH 6⊇ φ(e)} ∗ (C) := {e ∈ E : ρ(e) ∈ C πP (φ(e)) := {C ∩ φ(e) : C ∈ P} \ {∅} (2.11) (2.12) are the set of in-cut of C and the partition of e respectively.2 P ROOF The broadcast network is a special emulated source network in Definition 2.1 with, Yi := (Ze : e ∈ E, i ∈ φ(e) \ {ρ(e)}) Xi := (Ze : e ∈ E, i = ρ(e)) for any arbitrary orientation ρ of H. With the equalities − I(XC c ∧ YC |XC ) = H(YC |XC ) = |δH ∗ (C)| and X X X − |δH 1{C c 6⊇ φ(e)} ∗ (C)| = C∈P e∈E C63ρ(e) = X (|πP (φ(e))| − 1) e∈E the desired result follows from Proposition 2.1. − p (H) expresses an alternative notion of connectivity: the maximum x ∈ Q such that every partitioning of the vertices V into k parts split the edges into a total of at least dx(k −1)e additional parts for any k ∈ [|V |]. Each edge in H corresponds to a broadcast link of secret information flow as follows. Hyperedge as undirected broadcast link: Given an edge e, select a sender i ∈ φ(e) to encrypt an independent secret M ∈ Fq into the public message M + Ze . The remaining terminals in φ(e) can perfectly recover M knowing Ze . Since Ze is uniformly distributed, the encryption is perfectly secret. We effectively have a private broadcast link from i to φ(e) \ {i} with unit capacity. Viewing each edge as a broadcast link, the terminals can agree on a common secret key by broadcasting it through the network. In particular, at least one unit of secret information flow to all terminals is supported by an edge-connected spanning subhypergraph defined as follows. Edge-connected spanning subhypergraphs: An edge-connected spanning subhypergraph S H 0 := (V, E 0 , φ) 0 of a hypergraph (V, E, φ) satisfies E ⊆ E, e∈E 0 φ(e) = V and |δH 0 (C, C c )| ≥ 1 for every C ( V . Definition 2.5 (Network with undirected broadcast links) A network with undirected broadcast links defined by the hypergraph H = (V, E, φ) is used at each time as follows: for all e ∈ E, a sender i ∈ φ(e) can be selected to send a unit (log q bits) of data noiselessly to all receivers j ∈ φ(e).2 Although there is no analogous packing result to Proposition 2.3, this network coding approach to secret key agreement is also optimal by the following min-cut characterization of p − (H̃) in [6, Theorem 5.2]. Min-cut characterization of p − (H̃): For any s ∈ V , there is a star hypergraph H̃ ∗ of the extension H̃ of H (defined in (2.8) with p + replaced by p − ) such that + (C)| ≥ p − (H̃) for any C ( V : s ∈ C. |δH̃ ∗ Theorem 2.2 Given hypergraph H with p − (H) defined in (2.5), let CN,ub be the maximum throughput of a broadcast session of the delay-free network with undirected broadcast links in Defintion 2.5, and CS,bc be the secrecy capacity of the broadcast network defined in Definition 2.4, then CN,ub = CS,bc = (log q)p − (H) Furthermore, the maximum throughput and secrecy capacity can be attained asymptotically with finite delay at most 3 2 |V | |E|p − (H)2 logq |V | |E|p − (H)q. The throughput, in particular, can be achieved by the convolutional code in [11]. 2 P ROOF (S KETCH FROM [1]) This result follows from an extension of the algebraic argument in [11] using the extension[6, Theorem 4.1] of the Menger’s Theorem for star hypergraphs. The delay is the product nk(µ+1) of the extension n to turn H to H̃, the extension k to turn the field Fq to Fqk for existence of the desired network code, and the delay µ required to avoid cyclic dependency in the information flow of the network. In the following, we give a simple example for which one cannot decompose any extension H̃ of H into p − (H̃) spanning edge-connected subhypergraphs. This implies that coding may be necessary to attain the maximum throughput of the network with undirected broadcast links in a broadcast session. Example 2.2 For the broadcast network defined in Defintion 2.4, let q = 2 and H := (V, E, φ) be the hypergraph on V = [4] with edges E := {123, 134, 124} and φ(ijk) := {i, j, k} for i, j, k ∈ V . Then, p − (H) = 2 but it is not possible to pack two spanning edge-connected subhypergraphs, for that requires four edges. Indeed, we can maximally pack three spanning edge-connected subhypergraphs Hi := (V, Ẽi , φ̃) for i ∈ [3] after extending H with n = 2, where Ẽ1 := {(123, 1), (134, 1)}, Ẽ2 := {(124, 1), (123, 2)} and Ẽ3 := {(134, 2), (124, 2)}. Thus, a pure routing solution only achieves a key rate of 1.5 bits per use of the broadcast network in Definition 2.4. 6 Let H ∗ := (V, E, φ, ρ) be the star hypergraph of H where + ρ(e) = 1 for all e ∈ E. n.b. it satisfies |δH ∗ (C)| ≥ 2 for all C ⊆ V : s ∈ C. We can propagate two secret key bits K1 , K2 ∈ F2 from s := 1 using the following linear network code: send K1 through the broadcast link 123, K2 through 134, and K1 + K2 through 124. Since every terminal has access to at least two links, they can recover the key bits perfectly. 2 III. R ELATED W ORK λ∈Λ(F (A),V ) (Please see [1] for details.) Consider the more general secret key agreement problem in [2] where only a subset A ⊆ V of the terminals are active. As shown in [2], inequality ≤ for (1.3) holds with F replaced by F (A) := {B ⊆ V : ∅ 6= B 6⊇ A} Theorem 1.1 asserts that equality holds for A = V . However, equality may not hold when A ( V as shown by the counterexample below.4 This resolves an open question in [2]. Example 3.1 Given uniformly random bits X1 , X2 and X3 in F2 , define the source network ZV for V := [6] as follows: Z1 := X1 + X2 , Z2 := X1 + X3 , Z3 := X2 + X3 , Z4 = X3 , Z5 = X2 and Z6 = X1 . With A := [3], the mutual dependence in (1.2) (with F replaced by F (A)) and secrecy capacity on the R.H.S. of (1.3) are 1 bit and 0.75 bits respectively. 2 Indeed, Theorem 1.1 can be extended in a slightly different direction to a general identity for supermodular function optimizations using the following notion of partitions. Definition 3.1 Given a finite ground set V : |V | ≥ 2, define Φ(A) for A ⊆ V : |A| ≥ 2 as the collection of all families F ⊆ 2V \ {V } that satisfy for all B, B 0 ∈ F that B 6⊇ A and B ∪ B 0 6⊇ A =⇒ B ∩ B 0 , B ∪ B 0 ∈ F It follows that Φ(A) ( Φ(A0 ) for all A ( A0 . In particular, F (A0 ) ∈ Φ(A0 ) \ Φ(A) and F := 2V \ {V } = F (V ) ∈ Φ(V ). Denote F̄ := {B c : B ∈ F}. Define Π(F, U ) for F ∈ Φ(V ) and U ⊆ V as the collection of all families P such that {C ∩ U : C ∈ P} is a set-partition of U into at least 2 non-empty disjoint sets in F̄, i.e. [ P ⊆ F̄ : |P| ≥ 2, P ⊇ U and ∀i ∈ U, ∃!C ∈ P : i ∈ C It follows that Π(F, U ) ⊇ Π(F, U 0 ) for all U ⊆ U 0 . Define Λ(F, U ) as the set of λ := (λB : B ∈ F) satisfying X ∀B ∈ F, λB ≥ 0 and ∀i ∈ U, λB = 1 B∈F :i∈B 0 It follows that Λ(F, U ) ⊇ Λ(F, U ) for all U ⊆ U 0 . 2 Theorem 3.1 Given a finite ground set V : |V | ≥ 2, we have for all A ⊆ V : |A| ≥ 2, F ∈ Φ(A), and supermodular function h : F 7→ R that, X X 1 h(C c ) (3.1) max. λB h(B) = max. λ∈Λ(F ,A) P∈Π(F ,A) |P| − 1 B∈F C∈P with the convention that max. over an empty set is −∞.5 4 This 5 This Given A is the set of active users, let CSA,esn , CSA,if and be the secrecy capacities of the emulated source model, interference network and broadcast network respectively, and A A CN ,sl and CN,ub be the maximum throughput of the multicast session from some source node s ∈ A to all other nodes in A for the networks with selectable links and undirected broadcast links respectively. Then, X CSA,esn = (log q) min λB I(XB ∧ YB c |XB c ) CSA,bc 2 is also the minimal example, in lexicographical order of (|V |, |A|). gives as a corollary that Λ(F , A) = ∅ iff Π(F , A) = ∅. (a) A A CN ,sl ≤ CS,if = (log q) B∈F (A) X min λ∈Λ(F (A),V ) (b) A A CN ,ub ≤ CS,bc = (log q) − λB |δH ∗ (B)| B∈F (A) min λ∈Λ(F (A),V ) X + λB |δH ∗ (B)| B∈F (A) which are invariant to any star hypergraph H ∗ of H. The inequalities hold because the secret key agreement problem can be mapped to the corresponding network coding problem in the same way described before. We can also derive (b) using an alternative combinatorial argument since we have, (c) A 1 min |δ + ∗ (B)| CN ,ub = max n log q n,ρ̃ B⊆V :s∈B6⊇A H̃ X 1 (d) − (C)| = max n1 log q |δH̃ min ∗ n,ρ̃ P∈Π(F (A),A) |P| − 1 C∈P where ρ̃ is the orientation of the n-extension H̃ of H. (c) and (d) are obtained by extending [11, Theorem 15] and [6, Theorem 5.2] respectively. (b) then follows from Theorem 3.1 and the fact that Λ(F (A), A) ) Λ(F (A), V ). For the general class of network with both selectable links and undirected broadcast links, however, secrecy capacities conveniently upper bound maximum throughputs, with no obvious alternative proof. ACKNOWLEDGMENT The author would like to thank Bariş Nakibŏglu, Imre Csiszár, Jeff Kahn, Michel X. Goemans, Stephen P. Boyd, Anthony M.C. So, Angela Y.J. Zhang, Sidharth Jaggi and Raymond W.H. Yeung for stimulating discussions. R EFERENCES [1] Related work: http://mit.edu/chungc/dissertation. [2] I. Csiszár and P. Narayan, “Secrecy capacities for multiple terminals,” IEEE Transactions on Information Theory, vol. 50, Dec 2004. [3] T. M. Cover and J. A. Thomas, Elements of Information Theory. WileyInterscience Publication, 1991. [4] S. Fujishige, “Polymatroidal dependence structure of a set of random variables,” Information and Control, vol. 39, no. 1, pp. 55–72, 1978. [5] G. B. Dantzig and M. N. Thapa, Linear Programming. 1: Introduction. Springer-Verlag New York, 1997-2003. [6] J. Bang-Jensen and S. Thomassé, “Decompositions and orientations of hypergraphs.” Preprint no. 10, Department of Mathematics and Computer Science, University of Southern Denmark, May 2001. [7] A. Schrijver, Combinatorial Optimization: Polyhedra and Efficiency. Springer, 2002. [8] T. K. A. Frank and M. Kriesell, “On decomposing a hypergraph into k-connected sub-hypergraphs,” Discrete Applied Mathematics, vol. 131, pp. 373–383, September 2003. [9] C. Ye and A. Reznik, “Group secret key generation algorithms,” in IEEE International Symposium on Information Theory, 2007. ISIT 2008., pp. 2596–2600, June 2007. [10] Z. Li and B. Li, “Network coding in undirected networks,” in Proceedings of 38th Annual Conference on Information Sciences and Systems (CISS), 2004. [11] R. Koetter and M. Médard, “An algebraic approach to network coding,” IEEE/ACM Transactions on Networking, vol. 11, October 2003.