Simultaneously generating multiple keys over a cascade of a noiseless channel and a wiretap channel

Wenwen Tu, Mario Goldenbaum, Lifeng Lai, H. Vincent Poor

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations

Abstract

In this paper, the problem of simultaneously generating multiple keys over a cascade of a noiseless channel and a wiretap channel is considered. The problem consists of three legitimate parties, i.e., Alice, Bob and Carol, where Alice and Bob wish to agree with Carol on independent secret keys. Alice and Bob are connected via a noiseless channel, and Bob is connected with Carol via a wiretap channel, while there is no direct connection between Alice and Carol. To Alice and Carol, Bob acts as a relay. Under this model, a single-letter characterization of the secret-key capacity region is provided. The result shows that there exists a trade-off between the individual secret-key rates.

Original languageEnglish (US)
Title of host publication2016 IEEE Information Theory Workshop, ITW 2016
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages206-210
Number of pages5
ISBN (Electronic)9781509010905
DOIs
StatePublished - Oct 21 2016
Event2016 IEEE Information Theory Workshop, ITW 2016 - Cambridge, United Kingdom
Duration: Sep 11 2016Sep 14 2016

Publication series

Name2016 IEEE Information Theory Workshop, ITW 2016

Other

Other2016 IEEE Information Theory Workshop, ITW 2016
Country/TerritoryUnited Kingdom
CityCambridge
Period9/11/169/14/16

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Information Systems
  • Software
  • Signal Processing

Keywords

  • Cascade channels
  • Wiretap channel
  • correlated sources
  • simultaneous key generation

Fingerprint

Dive into the research topics of 'Simultaneously generating multiple keys over a cascade of a noiseless channel and a wiretap channel'. Together they form a unique fingerprint.

Cite this