Stealthy Secret Key Generation

被引:3
作者
Lin, Pin-Hsun [1 ]
Janda, Carsten R. [1 ]
Jorswieck, Eduard A. [1 ]
Schaefer, Rafael F. [2 ]
机构
[1] Tech Univ Carolo Wilhelmina Braunschweig, Informat Theory & Commun Syst Dept, D-38106 Braunschweig, Germany
[2] Tech Univ Berlin, Informat Theory & Applicat Chair, D-10623 Berlin, Germany
关键词
secret key generation; source model; stealthy communications; covert communications; channel resolvability; conceptual wiretap channel; stochastically degraded; stochastic orders; COMMUNICATION; AGREEMENT;
D O I
10.3390/e22060679
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
In order to make a warden, Willie, unaware of the existence of meaningful communications, there have been different schemes proposed including covert and stealth communications. When legitimate users have no channel advantage over Willie, the legitimate users may need additional secret keys to confuse Willie, if the stealth or covert communication is still possible. However, secret key generation (SKG) may raise Willie's attention since it has a public discussion, which is observable by Willie. To prevent Willie's attention, we consider the source model for SKG under a strong secrecy constraint, which has further to fulfill a stealth constraint. Our first contribution is that, if the stochastic dependence between the observations at Alice and Bob fulfills the strict more capable criterion with respect to the stochastic dependence between the observations at Alice and Willie or between Bob and Willie, then a positive stealthy secret key rate is identical to the one without the stealth constraint. Our second contribution is that, if the random variables observed at Alice, Bob, and Willie induced by the common random source form a Markov chain, then the key capacity of the source model SKG with the strong secrecy constraint and the stealth constraint is equal to the key capacity with the strong secrecy constraint, but without the stealth constraint. For the case of fast fading models, a sufficient condition for the existence of an equivalent model, which is degraded, is provided, based on stochastic orders. Furthermore, we present an example to illustrate our results.
引用
收藏
页数:14
相关论文
共 50 条
[31]   Communication-Constrained Secret Key Generation: Second-Order Bounds [J].
Hentila, Henri ;
Shkel, Yanina Y. ;
Koivunen, Visa .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2024, 70 (11) :8180-8203
[32]   Information Reconciliation Based on Systematic Secure Polar Code for Secret Key Generation [J].
Zhang, Shengjun ;
Jin, Liang ;
Zhu, Shilei ;
Huang, Kaizhi ;
Zhong, Zhou .
2018 IEEE 88TH VEHICULAR TECHNOLOGY CONFERENCE (VTC-FALL), 2018,
[33]   ON POLAR CODING FOR FINITE BLOCKLENGTH SECRET KEY GENERATION OVER WIRELESS CHANNELS [J].
Hentila, Henri ;
Shkel, Yanina Y. ;
Koivunen, Visa ;
Poor, H. Vincent .
2020 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, 2020, :5265-5269
[34]   Secret Key Generation With Cross Multiplication of Two-Way Random Signals [J].
Jin, Liang ;
Zhang, Shengjun ;
Lou, Yangming ;
Xu, Xiaoming ;
Zhong, Zhou .
IEEE ACCESS, 2019, 7 :113065-113080
[35]   A Novel Physical Layer Secret Key Generation Method for Wireless Sensor Networks [J].
Aygul, Mehmet Ali ;
Cirpan, Hakan Ali ;
Arslan, Huseyin .
2024 IEEE INTERNATIONAL BLACK SEA CONFERENCE ON COMMUNICATIONS AND NETWORKING, BLACKSEACOM 2024, 2024, :231-235
[36]   IRS-Assisted Hybrid Secret Key Generation [J].
Zhang, Meixiang ;
Zhuang, Ziyue ;
Kim, Sooyoung .
SYMMETRY-BASEL, 2023, 15 (10)
[37]   Filterbank Secret Key Generation Rates in Multipath Channels [J].
Mitev, Miroslav ;
Barreto, Andre N. ;
Pham, Thuy M. ;
Matthe, Maximilian ;
Fettweis, Gerhard .
2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022), 2022, :4057-4062
[38]   Secret Key Generation by Continuous Encryption Before Quantization [J].
Maksud, Ahmed ;
Hua, Yingbo .
IEEE SIGNAL PROCESSING LETTERS, 2022, 29 :1497-1501
[39]   Secret Key Generation for a Pairwise Independent Network Model [J].
Nitinawarat, Sirin ;
Ye, Chunxuan ;
Barg, Alexander ;
Narayan, Prakash ;
Reznik, Alex .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2010, 56 (12) :6482-6489
[40]   Intelligent Reflecting Surface Assisted Secret Key Generation [J].
Lu, Xinjin ;
Lei, Jing ;
Shi, Yuxin ;
Li, Wei .
IEEE SIGNAL PROCESSING LETTERS, 2021, 28 :1036-1040