Secret Key Generation for Pairwise Independent Networks with Curious Helpers

被引:0
作者
Lin, Pin-Hsun [1 ]
Janda, Carsten R. [1 ]
Jorswieck, Eduard A. [1 ]
Hong, Yao-Win Peter [2 ]
机构
[1] Tech Univ Dresden, Dept Elect Engn & Informat Technol, Commun Lab, Dresden, Germany
[2] Natl Tsing Hua Univ, Inst Commun Engn, Hsinchu, Taiwan
来源
2017 IEEE 18TH INTERNATIONAL WORKSHOP ON SIGNAL PROCESSING ADVANCES IN WIRELESS COMMUNICATIONS (SPAWC) | 2017年
关键词
COMMON RANDOMNESS; INFORMATION;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
We consider the problem of group secret key generation through a multi-hop network modeled by a pair-wise independent network and propose a low complexity scheme which can guarantee strong secrecy. We assume that the legitimate transmitter only has the knowledge of the maximum number of precoded keys known to any helpers, where the precoded keys are the output of a precoder at the transmitter to be propagated through the network. We also assume that nodes in the multi-hop network are curious, i.e., they not only help to relay but may eavesdrop. Confidentiality is required against an eavesdropper outside of the multi-hop network and also against the helpers in the multi-hop network, while both the curious helpers and the external eavesdropper can access a finite rate public channel between the legitimate transmitter-receiver pair. The objective is to generate secret keys shared by a given pair of nodes outside of the multi-hop network at the largest possible rate, with the cooperation of the nodes within the multi-hop network. We propose a low complexity linear transformation-based global key propagation approach to combat curious helpers by the number theoretic transform, under two scenarios: with an additional public or private channel between the pair of nodes aiming to share keys. We analyze the achievable secret key rate and investigate the performances under different network setting by numerical examples.
引用
收藏
页数:5
相关论文
共 19 条
[1]   COMMON RANDOMNESS IN INFORMATION-THEORY AND CRYPTOGRAPHY .1. SECRET SHARING [J].
AHLSWEDE, R ;
CSISZAR, I .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1993, 39 (04) :1121-1132
[2]  
[Anonymous], 2003, Algebraic Codes for Data Transmission
[3]  
[Anonymous], 2011, Physical-layer security:from information theory to security engineering, DOI DOI 10.1017/CBO9780511977985
[4]  
Argyraki Katerina., 2013, Proceedings of the 19th annual international conference on Mobile computing networking, P429
[5]  
CSISZAR I, 1978, IEEE T INFORM THEORY, V24, P339, DOI 10.1109/TIT.1978.1055892
[6]   Secrecy capacities for multiple terminals [J].
Csiszár, I ;
Narayan, P .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2004, 50 (12) :3047-3061
[7]   Common randomness and secret key generation with a helper [J].
Csiszár, I ;
Narayan, P .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2000, 46 (02) :344-366
[8]   Key Generation Algorithms for Pairwise Independent Networks Based on Graphical Models [J].
Lai, Lifeng ;
Ho, Siu-Wai .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2015, 61 (09) :4828-4837
[9]  
Lin P.-H., SECRET KEY GEN UNPUB
[10]  
MAURER UM, 1993, IEEE T INFORM THEORY, V39, P733, DOI 10.1109/18.256484