On Simultaneously Generating Multiple Keys in a Joint Source-Channel Model

Wenwen Tu, Mario Goldenbaum, Lifeng Lai, H. Vincent Poor

Research output: Contribution to journalArticlepeer-review

7 Scopus citations

Abstract

In this paper, the problem of simultaneously generating multiple keys over a cascade of a noiseless channel and a wiretap channel is considered. The problem consists of three legitimate parties (i.e., Alice, Bob, and Carol) and an eavesdropper (Eve), where Alice and Bob wish to agree with Carol on independent secret keys, both of which should be kept secret from Eve. Alice and Bob are connected via a noiseless channel, and Bob is connected with Carol via a wiretap channel, while there is no direct connection between Alice and Carol. To Alice and Carol, Bob acts as a relay. Under this model, a full characterization of the secret-key capacity region is provided for the case in which Eve has no side information. This result shows that there exists a tradeoff between the individual secret-key rates. Then, this result is generalized to the case in which Eve has side information, and the corresponding secret-key capacity region is fully characterized.

Original languageEnglish (US)
Pages (from-to)298-308
Number of pages11
JournalIEEE Transactions on Information Forensics and Security
Volume12
Issue number2
DOIs
StatePublished - Feb 2017

All Science Journal Classification (ASJC) codes

  • Safety, Risk, Reliability and Quality
  • Computer Networks and Communications

Keywords

  • Cascaded channels
  • correlated sources
  • key capacity region
  • simultaneous key generation
  • wiretap channel

Fingerprint

Dive into the research topics of 'On Simultaneously Generating Multiple Keys in a Joint Source-Channel Model'. Together they form a unique fingerprint.

Cite this