Secret Key Generation Through a Relay

被引:0
作者
Kittichokechai, Kittipong [1 ]
Schaefer, Rafael F. [1 ]
Caire, Giuseppe [1 ]
机构
[1] Tech Univ Berlin, Berlin, Germany
来源
2016 IEEE INFORMATION THEORY WORKSHOP (ITW) | 2016年
关键词
COMMON RANDOMNESS; INFORMATION; COMMUNICATION; AGREEMENT;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We consider problems of two-user secret key generation through an intermediate relay. In the untrusted relay setting, the goal is to establish key agreement between the two users at the highest key rate without leaking information about the key to the relay. We characterize inner and outer bounds to the optimal tradeoff between communication and key rates. The inner bound is based on the scheme which involves a combination of binning, network coding, and key aggregation techniques. For the trusted relay setting with a public broadcast link, the optimal communication-key rate tradeoff is provided for a special case where the two sources are available losslessly at the relay.
引用
收藏
页数:5
相关论文
共 50 条
[1]   Physical-Layer Secret and Private Key Generation in Wireless Relay Networks With Correlated Eavesdropping Channels [J].
Xu, Peng ;
Yang, Jun ;
Chen, Gaojie ;
Yang, Zheng ;
Li, Yong ;
Win, Moe Z. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 :985-1000
[2]   Relay-based Secret Key Generation in LTE-A [J].
Chen, Kan ;
Natarajan, Balasubramaniam ;
Shattil, Steve .
2014 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2014, :139-144
[3]   Secret Key Generation With Limited Interaction [J].
Liu, Jingbo ;
Cuff, Paul ;
Verdu, Sergio .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2017, 63 (11) :7358-7381
[4]   Secret Key Generation Via Localization and Mobility [J].
Gungor, Onur ;
Chen, Fangzhou ;
Koksal, Can Emre .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2015, 64 (06) :2214-2230
[5]   Covert Secret Key Generation [J].
Tahmasbi, Mehrdad ;
Bloch, Matthieu R. .
2017 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2017, :540-544
[6]   Stealthy Secret Key Generation [J].
Lin, Pin-Hsun ;
Janda, Carsten R. ;
Jorswieck, Eduard A. ;
Schaefer, Rafael F. .
ENTROPY, 2020, 22 (06)
[7]   Stealthy Secret Key Generation [J].
Lin, Pin-Hsun ;
Janda, Carsten Rudolf ;
Jorswieck, Eduard Axel .
2017 IEEE GLOBAL CONFERENCE ON SIGNAL AND INFORMATION PROCESSING (GLOBALSIP 2017), 2017, :492-496
[8]   Secret Key Generation in the Two-Way Relay Channel With Active Attackers [J].
Zhou, Heng ;
Huie, Lauren M. ;
Lai, Lifeng .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (03) :476-488
[9]   Secret Key Generation From Mobility [J].
Gungor, Onur ;
Chen, Fangzhou ;
Koksal, C. Emre .
2011 IEEE GLOBECOM WORKSHOPS (GC WKSHPS), 2011, :874-878
[10]   The Capacity Region of the Source-Type Model for Secret Key and Private Key Generation [J].
Zhang, Huishuai ;
Lai, Lifeng ;
Liang, Yingbin ;
Wang, Hua .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2014, 60 (10) :6389-6398