3.2.2 Number of Visits in the State −1
The most critical moment from the point of informa-
tion leakage when Alice interacts with an alleged Bob
not knowing the shared key K, is the number of vis-
its in the state −1 of M
F
. Indeed, in this case Alice
must send the correct value of the corresponding bit
a
t
. In case of the states 0 and 1 there is only a bias
to send the correct bit: so as the number of steps until
the chain reaches the absorbing state F is small, it is
hard to derive a meaningful statistical information.
Let Z be the random variable denoting the number
of visits of the state −1 during an execution of the
chain M
F
. Some computations involving equations 9
yield the following formulas:
Fact 15. E[Z] =
2(1−p)
p
2
.
Var[Z] =
2(1 −p)
3p
2
−2p + 2
p
4
(13)
Fact 13 shows that the expected number of visits in
the state −1 is quite small for any reasonable choice
of p. Also variance has relatively small values for
p ∈ (0.5, 1) (see Subsec. 3.3).
3.3 Example Choice: p =
2
3
We have already noticed that neither the values of p
close to
1
2
nor the values values of p close to 1 is the
right choice, so let us see what happens in the middle.
Honest Execution. In the case when Alice is Bob
follows honestly the protocol, then the stationary dis-
tribution is given by vector π = (
2
7
,
3
7
,
2
7
). The total
variation distance between distribution π
t
of M
C
and
its stationary distribution is
kπ −π
t
k
TV
=
4
7
·
2
9
t
. (14)
So kπ−π
5
k
TV
≈0.0003, kπ−π
10
k
TV
≈0.00000017,
kπ −π
32
k
TV
≈ 10
−21
.
Execution with Eve impersonating Bob. From
Equations 11 and 12 we get that the expected time
to reach the state F where Alice starts to send purely
random bits is E[Y ] = 9 and Var[Y ] = 54, so the stan-
dard deviation is approximately 7.35.
By Fact 15 and Equation 13 we deduce that the
number of visits of the state −1 before the process
reaches the absorbing state F we have E[Z] =
3
2
and
Var[Z] =
27
4
, and the standard deviation is ≈ 2.6.
ACKNOWLEDGEMENTS
Authors would like to thanks Łukasz Krzywiecki for
bringing attention to the problem discussed here.
REFERENCES
Asokan, N., Schunter, M., and Waidner, M. (1997). Op-
timistic protocols for fair exchange. In Graveman,
R., Janson, P. A., Neuman, C., and Gong, L., editors,
Proc. 4th ACM Conference on Computer and Commu-
nications Security, pages 7–17. ACM.
Avoine, G., Bing
¨
ol, M. A., Boureanu, I., Capkun, S.,
Hancke, G. P., Kardas, S., Kim, C. H., Lauradoux,
C., Martin, B., Munilla, J., Peinado, A., Rasmussen,
K. B., Singel
´
ee, D., Tchamkerten, A., Trujillo-Rasua,
R., and Vaudenay, S. (2019). Security of distance-
bounding: A survey. ACM Comput. Surv., 51(5):94:1–
94:33.
Bettaieb, S., Bidoux, L., Connan, Y., Gaborit, P., and
Hauteville, A. (2018). The learning with rank errors
problem and an application to symmetric authentica-
tion. In 2018 IEEE International Symposium on In-
formation Theory, ISIT, pages 2629–2633. IEEE.
Blum, M. (1983). How to exchange (secret) keys (extended
abstract). In Johnson, D. S., Fagin, R., Fredman,
M. L., Harel, D., Karp, R. M., Lynch, N. A., Papadim-
itriou, C. H., Rivest, R. L., Ruzzo, W. L., and Seiferas,
J. I., editors, Proc. 15th ACM Symposium on Theory of
Computing, pages 440–447. ACM.
Boureanu, I., G
´
erault, D., Lafourcade, P., and Onete, C.
(2017). Breaking and fixing the HB+DB protocol.
In Noubir, G., Conti, M., and Kasera, S. K., edi-
tors, Proc. of the 10th ACM Conference on Security
and Privacy in Wireless and Mobile Networks, WiSec,
pages 241–246. ACM.
Chi, D. P., Choi, J. W., Kim, J. S., and Kim, T. (2015). Lat-
tice based cryptography for beginners. IACR Cryptol.
ePrint Arch., 2015:938.
Even, S. and Yacobi, Y. (1980). Relations among public
key signature schemes. Technical Report 175, TECH-
NION.
ICAO (2015). Machine Readable Travel Documents - Part
11: Security Mechanism for MRTDs. Doc 9303.
Kutyłowski, M., Lauks-Dutka, A., and Yung, M. (2020).
GDPR - challenges for reconciling legal rules with
technical reality. In Chen, L., Li, N., Liang, K., and
Schneider, S. A., editors, Computer Security - 25th
European Symposium on Research in Computer Se-
curity, Proc., Part I, volume 12308 of LNCS, pages
736–755. Springer.
Spindler, G. and Schmechel, P. (2016). Personal data and
encryption in the European General Data Protection
Regulation. JIPITEC, 7(2):163–177.
The European Parliament and the Council (2016). Regu-
lation (EU) 2016/679 of the European Parliament and
of the Council of 27 April 2016 on the protection of
natural persons with regard to the processing of per-
sonal data and on the free movement of such data, and
repealing Directive 95/46/ec (General Data Protection
Regulation). Official Journal of the European Union,
119(1).
Fair Mutual Authentication
759