Secret-Key Generation Using Compound Sources and One-Way Public Communication

被引:17
|
作者
Tavangaran, Nima [1 ]
Boche, Holger [1 ]
Schaefer, Rafael F. [2 ,3 ]
机构
[1] Tech Univ Munich, Lehrstuhl Theoret Informat Tech, D-80290 Munich, Germany
[2] Princeton Univ, Dept Elect Engn, Princeton, NJ 08544 USA
[3] Tech Univ Berlin, Informat Theory & Applicat Chair, D-10587 Berlin, Germany
关键词
Compound source; secret-key capacity; common randomness; hypothesis testing; COMMON RANDOMNESS; INFORMATION-THEORY; CRYPTOGRAPHY; CAPACITY;
D O I
10.1109/TIFS.2016.2611484
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In the classical secret-key generation model, common randomness is generated by two terminals based on the observation of correlated components of a common source, while keeping it secret from a non-legitimate observer. It is assumed that the statistics of the source are known to all participants. In this paper, the secret-key generation based on a compound source is studied where the realization of the source statistic is unknown. The protocol should guarantee the security and reliability of the generated secret-key, simultaneously for all possible realizations of the compound source. A single-letter lower-bound of the secret-key capacity for a finite compound source is derived as a function of the public communication rate constraint. A multi-letter capacity formula is further computed for a finite compound source for the case in which the public communication is unconstrained. Finally, a single-letter capacity formula is derived for a degraded compound source with an arbitrary (possibly infinite) set of source states and a finite set of marginal states.
引用
收藏
页码:227 / 241
页数:15
相关论文
共 50 条
  • [41] A new multi-stage secret sharing scheme using one-way function
    Chang, Ting-Yi
    Hwang, Min-Shiang
    Yang, Wei-Pang
    Operating Systems Review (ACM), 2005, 39 (01): : 48 - 55
  • [42] CSI-Based Versus RSS-Based Secret-Key Generation Under Correlated Eavesdropping
    Rottenberg, Francois
    Trung-Hien Nguyen
    Dricot, Jean-Michel
    Horlin, Francois
    Louveaux, Jerome
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2021, 69 (03) : 1868 - 1881
  • [43] Secret-key agreement over unauthenticated public channels - Part II: The simulatability condition
    Maurer, U
    Wolf, S
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2003, 49 (04) : 832 - 838
  • [44] Minimizing center key storage in hybrid one-way function based group key management with communication constraints
    Li, MY
    Poovendran, R
    McGrew, DA
    INFORMATION PROCESSING LETTERS, 2005, 93 (04) : 191 - 198
  • [45] Secure Degree of Freedom Bound of Secret-Key Capacity for Two-Way Wiretap Channel
    Liang, Qingpeng
    Du, Linsong
    Wu, Yanzhi
    Ma, Zheng
    IEEE SIGNAL PROCESSING LETTERS, 2025, 32 : 581 - 585
  • [46] Secret-key agreement over unauthenticated public channels - Part III: Privacy amplification
    Maurer, U
    Wolf, S
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2003, 49 (04) : 839 - 851
  • [47] Secret-Key Agreement for Security in Multi-Emitter Visible Light Communication Systems
    Mukherjee, Amitav
    IEEE COMMUNICATIONS LETTERS, 2016, 20 (07) : 1361 - 1364
  • [48] Enhanced secret-key generation from atmospheric optical channels with the use of random modulation
    Chen, Chunyi
    LI, Qiong
    OPTICS EXPRESS, 2022, 30 (25) : 45862 - 45882
  • [49] Key establishment in large dynamic groups using one-way function trees
    Sherman, AT
    McGrew, DA
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2003, 29 (05) : 444 - 458
  • [50] An Investigation of Using Loop-Back Mechanism for Channel Reciprocity Enhancement in Secret Key Generation
    Peng, Linning
    Li, Guyue
    Zhang, Junqing
    Woods, Roger
    Liu, Ming
    Hu, Aiqun
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2019, 18 (03) : 507 - 519