2014
DOI: 10.1109/tit.2014.2340400
|View full text |Cite
|
Sign up to set email alerts
|

The Capacity Region of the Source-Type Model for Secret Key and Private Key Generation

Abstract: The problem of simultaneously generating a secret key (SK) and private key (PK) pair among three terminals via public discussion is investigated. In this problem, each terminal observes a component of correlated sources. All three terminals are required to generate the common SK to be concealed from an eavesdropper that has access to the public discussion, while two designated terminals are required to generate an extra PK to be concealed from both the eavesdropper and the remaining terminal. An outer bound on… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
20
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
3
3
1

Relationship

1
6

Authors

Journals

citations
Cited by 23 publications
(20 citation statements)
references
References 19 publications
0
20
0
Order By: Relevance
“…Theorem 1: Among the training-based approaches for secret key generation among three nodes, Algorithm A achieves the optimal key rate for a given tuple (T 1 , T 2 , T 3 ), which is defined in (15).…”
Section: B Optimal Rate Allocationmentioning
confidence: 99%
See 2 more Smart Citations
“…Theorem 1: Among the training-based approaches for secret key generation among three nodes, Algorithm A achieves the optimal key rate for a given tuple (T 1 , T 2 , T 3 ), which is defined in (15).…”
Section: B Optimal Rate Allocationmentioning
confidence: 99%
“…The works in [7]- [15] aimed to find informationtheoretic secrecy key capacities in a variety of source models, however, they have not provided methods to obtain the source observations. Due to channel reciprocity in time-division duplex (TDD) systems, the correlative observations can be obtained via estimates of the wireless fading channels between the legitimate users, which demonstrates the advantages of the source model based key generation approach to support secure multimedia service.…”
mentioning
confidence: 99%
See 1 more Smart Citation
“…Our outline contains major key generation steps and intuitive explanation about the secrecy properties of the generated secret and private keys. The mathematical details are omitted due to the space limitations, and can be referred to [17]. In case 2,…”
Section: B Main Theoremmentioning
confidence: 99%
“…Due to space limitations, we provide only outlines of our achievable schemes. The detailed proof can be found in [17].…”
Section: Introductionmentioning
confidence: 99%