Secret Key Generation Through a Relay

被引:0
|
作者
Kittichokechai, Kittipong [1 ]
Schaefer, Rafael F. [1 ]
Caire, Giuseppe [1 ]
机构
[1] Tech Univ Berlin, Berlin, Germany
来源
2016 IEEE INFORMATION THEORY WORKSHOP (ITW) | 2016年
关键词
COMMON RANDOMNESS; INFORMATION; COMMUNICATION; AGREEMENT;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We consider problems of two-user secret key generation through an intermediate relay. In the untrusted relay setting, the goal is to establish key agreement between the two users at the highest key rate without leaking information about the key to the relay. We characterize inner and outer bounds to the optimal tradeoff between communication and key rates. The inner bound is based on the scheme which involves a combination of binning, network coding, and key aggregation techniques. For the trusted relay setting with a public broadcast link, the optimal communication-key rate tradeoff is provided for a special case where the two sources are available losslessly at the relay.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] Physical-Layer Secret and Private Key Generation in Wireless Relay Networks With Correlated Eavesdropping Channels
    Xu, Peng
    Yang, Jun
    Chen, Gaojie
    Yang, Zheng
    Li, Yong
    Win, Moe Z.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 985 - 1000
  • [2] Relay-based Secret Key Generation in LTE-A
    Chen, Kan
    Natarajan, Balasubramaniam
    Shattil, Steve
    2014 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2014, : 139 - 144
  • [3] Secret Key Generation With Limited Interaction
    Liu, Jingbo
    Cuff, Paul
    Verdu, Sergio
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2017, 63 (11) : 7358 - 7381
  • [4] Secret Key Generation Via Localization and Mobility
    Gungor, Onur
    Chen, Fangzhou
    Koksal, Can Emre
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2015, 64 (06) : 2214 - 2230
  • [5] Covert Secret Key Generation
    Tahmasbi, Mehrdad
    Bloch, Matthieu R.
    2017 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2017, : 540 - 544
  • [6] Stealthy Secret Key Generation
    Lin, Pin-Hsun
    Janda, Carsten R.
    Jorswieck, Eduard A.
    Schaefer, Rafael F.
    ENTROPY, 2020, 22 (06)
  • [7] Stealthy Secret Key Generation
    Lin, Pin-Hsun
    Janda, Carsten Rudolf
    Jorswieck, Eduard Axel
    2017 IEEE GLOBAL CONFERENCE ON SIGNAL AND INFORMATION PROCESSING (GLOBALSIP 2017), 2017, : 492 - 496
  • [8] Secret Key Generation in the Two-Way Relay Channel With Active Attackers
    Zhou, Heng
    Huie, Lauren M.
    Lai, Lifeng
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (03) : 476 - 488
  • [9] Secret Key Generation From Mobility
    Gungor, Onur
    Chen, Fangzhou
    Koksal, C. Emre
    2011 IEEE GLOBECOM WORKSHOPS (GC WKSHPS), 2011, : 874 - 878
  • [10] The Capacity Region of the Source-Type Model for Secret Key and Private Key Generation
    Zhang, Huishuai
    Lai, Lifeng
    Liang, Yingbin
    Wang, Hua
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2014, 60 (10) : 6389 - 6398