Multiple key generation with restricted public discussion structure

Wenwen Tu, Mario Goldenbaum, Lifeng Lai, H. Vincent Poor

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In this paper, the problem of simultaneously generating multiple keys in a model where the key generating parties have restricted access to public discussions is considered. The model consists of four terminals, i.e., Alice, Bob, Carol and Eve. Alice and Bob are connected via a noiseless channel while Bob connects with Carol and Eve via a wiretap channel. There is no direct link connecting Alice with Carol or Eve, and hence Carol and Eve cannot directly access the discussion between Alice and Bob. Alice wishes to share a secret key with Carol while Bob wishes to share another independent secret key with Carol. Under this model, inner and outer bounds on the secret-key capacity region are provided. It is shown that the two bounds match when a certain Markov chain relationship holds.

Original languageEnglish (US)
Title of host publication2016 IEEE Conference on Communications and Network Security, CNS 2016
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages641-645
Number of pages5
ISBN (Electronic)9781509030651
DOIs
StatePublished - Feb 21 2017
Event2016 IEEE Conference on Communications and Network Security, CNS 2016 - Philadelphia, United States
Duration: Oct 17 2016Oct 19 2016

Publication series

Name2016 IEEE Conference on Communications and Network Security, CNS 2016

Other

Other2016 IEEE Conference on Communications and Network Security, CNS 2016
Country/TerritoryUnited States
CityPhiladelphia
Period10/17/1610/19/16

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Safety, Risk, Reliability and Quality

Keywords

  • Correlated sources
  • multiple key generation
  • source-channel model
  • wiretap channel

Fingerprint

Dive into the research topics of 'Multiple key generation with restricted public discussion structure'. Together they form a unique fingerprint.

Cite this