2014 IEEE International Symposium on Information Theory 2014
DOI: 10.1109/isit.2014.6875011
|View full text |Cite
|
Sign up to set email alerts
|

Secret key-private key generation over three terminals: Capacity region

Abstract: The problem of simultaneously generating a secret key (SK) and private key (PK) pair among three terminals via public discussion is investigated, in which each terminal observes a component of correlated sources. All three terminals are required to generate a common secret key concealed from an eavesdropper that has access to public discussion, while two designated terminals are required to generate an extra private key concealed from both the eavesdropper and the remaining terminal. An outer bound on the SK-P… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Year Published

2014
2014
2017
2017

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
references
References 18 publications
0
0
0
Order By: Relevance