Abstract
The problem of simultaneously generating multiple keys for a cellular source model with a helper is investigated. In the model considered, there are four terminals, χ0, χ1, χ2, and χ3, each of which observes one component of a vector source. Terminal χ0 wishes to generate two secret keys K1 and K2, respectively, with terminals χ1 and χ2 under the help of terminal χ3. All terminals are allowed to communicate over a public channel. An eavesdropper is assumed to have access to the public discussion. Both symmetric and asymmetric key generations are considered. In symmetric key generation models, model 1a (with a trusted helper) requires that the two keys are concealed from the eavesdropper, and model 1b (with an untrusted helper) further requires that the two keys are concealed from the helper in addition to the eavesdropper. The asymmetric key generation models 2a and 2b are the same as symmetric key generation models 1a and 1b, respectively, except that the key K2 is further required to be concealed from terminal χ1. For all models studied, the key capacity region is established by designing a unified achievable strategy to achieve the cut-set outer bounds. We also study the problem of generating more than two keys and characterize its key capacity region when all the cellular terminals are required to generate independent keys with the base station.
Original language | English |
---|---|
Article number | 7891581 |
Pages (from-to) | 3804-3822 |
Number of pages | 19 |
Journal | IEEE Transactions on Information Theory |
Volume | 63 |
Issue number | 6 |
DOIs | |
State | Published - Jun 2017 |
Keywords
- Fourier-Motzkin elimination
- Secret key generation
- cellular network
- key capacity region
- multiple keys
All Science Journal Classification (ASJC) codes
- Information Systems
- Computer Science Applications
- Library and Information Sciences