Linear Key Construction in Finite Fields
- Linear key construction is a method where secret keys are generated as linear functions of common random vectors observed by multiple parties over finite fields.
- It employs non-interactive protocols featuring private linear processing and discussion-optimal public communications to ensure perfect recoverability and secrecy.
- The framework precisely characterizes communication complexity and key capacity, aligning one-shot finite models with classical asymptotic secrecy results.
Linear key construction refers to the methodology by which a secret key is generated as a linear function of the collective observations of multiple users, each of whom has access to a distinct linear function of a common underlying random vector. The discussion and operations are performed over a finite field, and all protocols enforce linearity in the transformations and communications used to achieve perfect secret key agreement. In the one-shot finite linear source model, as investigated in (Chan et al., 2019), both the structure of the linear observations and the linearity constraints on public discussion allow for a precise characterization of the communication complexity required for achieving maximum-length secret key agreement, as well as the explicit construction of such keys.
1. Finite Linear Source Model
Let denote the set of users, and fix a finite field . The common randomness is captured by a base random vector:
with entropy . Each user observes
where is a fixed matrix over . The full system of observations is summarized as
where is the concatenation of the individual . Redundant rows in are discarded so that . All public communications are constrained to be linear: each user sends
with of size . Collectively, aggregates the public discussion, and . It is established, via Theorem 1 in (Chan et al., 2019), that no private randomness is needed for achieving the optimal key length.
2. Capacity and Communication Complexity
The unconstrained secret-key length, denoted , is defined as the maximum for which a linear secret key agreement protocol exists:
where is the set of all nontrivial partitions of . The communication-for-omniscience cost, , is characterized as
which, by Theorem 2, satisfies
The exact communication complexity —that is, the minimal total linear public discussion required to achieve —matches this value:
3. Non-Interactive Protocol Structure
The construction achieves secret-key agreement by means of a non-interactive two-step protocol:
a) Private Linear Processing:
Each user applies invertible linear transformations to their observation vectors to obtain a reduced form . Successive deletions of unrecoverable coordinates and invertible transformations reduce while preserving , as specified in Theorem 4. This process continues until further reduction would decrease , resulting in a minimal formulation.
b) Discussion-Optimal Communication-for-Omniscience:
Public communication rates are determined via the solution to the following integer linear program:
- Minimize
- Subject to:
For each , a full-rank matrix of size is selected so that the stacked enables all users to reconstruct . Explicitly, the matrices are chosen so that for every ,
ensuring each user's omniscience given their private view and the public discussion.
4. Linear Key Extraction
Once omniscience of is achieved, the secret key is defined as the maximal common linear function of all . This is operationalized by selecting a matrix whose column space complements the row space of the entire public discussion mapping:
The secret key is thus extracted as
This construction guarantees both perfect recoverability—every user can deterministically reconstruct from their private observation and the public discussion—and perfect secrecy— is statistically independent from .
5. Secrecy and Recoverability Criteria
Correctness and security of the linear key are ensured by the following criteria:
- Perfect Recoverability: For all , .
- Perfect Secrecy: , equivalently . No private randomness is necessary, as formally demonstrated in [(Chan et al., 2019), Thm 1]. The resulting key can always be chosen as a linear function of the base source variables.
6. Relation to Classical Asymptotic Models
In classical (asymptotic, many-sample) models as in Csiszár–Narayan, secret-key rates and public-discussion rates are defined per sample. The asymptotic secrecy capacity for the finite-linear-source model is given by:
with requisite public discussion rate minus the capacity. The one-shot formulas for and agree with these, aside from integer rounding—using the floor for and ceiling for . Thus, the linear key construction in the one-shot regime exactly realizes what classical protocols achieve asymptotically across multiple samples. Notably, this linear framework encompasses previously studied models such as hypergraphical and PIN models, which are special cases under this general template (Chan et al., 2019).