Secret Key Generation Through a Relay

被引:0
作者
Kittichokechai, Kittipong [1 ]
Schaefer, Rafael F. [1 ]
Caire, Giuseppe [1 ]
机构
[1] Tech Univ Berlin, Berlin, Germany
来源
2016 IEEE INFORMATION THEORY WORKSHOP (ITW) | 2016年
关键词
COMMON RANDOMNESS; INFORMATION; COMMUNICATION; AGREEMENT;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We consider problems of two-user secret key generation through an intermediate relay. In the untrusted relay setting, the goal is to establish key agreement between the two users at the highest key rate without leaking information about the key to the relay. We characterize inner and outer bounds to the optimal tradeoff between communication and key rates. The inner bound is based on the scheme which involves a combination of binning, network coding, and key aggregation techniques. For the trusted relay setting with a public broadcast link, the optimal communication-key rate tradeoff is provided for a special case where the two sources are available losslessly at the relay.
引用
收藏
页数:5
相关论文
共 50 条
[21]   Secret-Key Generation Using Correlated Sources and Channels [J].
Khisti, Ashish ;
Diggavi, Suhas N. ;
Wornell, Gregory W. .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2012, 58 (02) :652-670
[22]   Secret Key Generation for Pairwise Independent Networks with Curious Helpers [J].
Lin, Pin-Hsun ;
Janda, Carsten R. ;
Jorswieck, Eduard A. ;
Hong, Yao-Win Peter .
2017 IEEE 18TH INTERNATIONAL WORKSHOP ON SIGNAL PROCESSING ADVANCES IN WIRELESS COMMUNICATIONS (SPAWC), 2017,
[23]   Secret Key Generation over Noisy Channels with Common Randomness [J].
Bassi, German ;
Piantanida, Pablo ;
Shamai , Shlomo .
2016 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, 2016, :510-514
[24]   Vector Quantization and Clustered Key Mapping for Channel-Based Secret Key Generation [J].
Hong, Y. -W. Peter ;
Huang, Lin-Ming ;
Li, Hou-Tung .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (05) :1170-1181
[25]   Power Allocation Strategy for Secret Key Generation [J].
Zhang, Bin ;
Waqas, Muhammad ;
Tu, Shanshan ;
Hussain, Syed Mudassir ;
Rehman, Sadaqat Ur .
CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 68 (02) :2179-2188
[26]   Covert Secret Key Generation With an Active Warden [J].
Tahmasbi, Mehrdad ;
Bloch, Matthieu R. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 :1026-1039
[27]   Common randomness and secret key generation with a helper [J].
Csiszár, I ;
Narayan, P .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2000, 46 (02) :344-366
[28]   Secure Secret Key and Private Key Generation in Source-Type Model With a Trusted Helper [J].
Gong, Shixun ;
Tao, Xiaofeng ;
Li, Na ;
Wang, Haowei ;
Han, Zhu .
IEEE ACCESS, 2020, 8 :34611-34628
[29]   Secret-Key Generation with Arbitrarily Varying Eavesdropper's Channel [J].
Chou, Remi A. ;
Bloch, Matthieu R. .
2013 IEEE GLOBAL CONFERENCE ON SIGNAL AND INFORMATION PROCESSING (GLOBALSIP), 2013, :277-280
[30]   Secret key generation from Gaussian sources using lattice hashing [J].
Ling, Cong ;
Luzzi, Laura ;
Bloch, Matthieu R. .
2013 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS (ISIT), 2013, :2621-+