Multi-Key Generation over a Cellular Model with a Helper

Huishuai Zhang, Yingbin Liang, Lifeng Lai, Shlomo Shamai Shitz

Research output: Contribution to journalArticlepeer-review


The problem of simultaneously generating multiple keys for a cellular source model with a helper is investigated. In the model considered, there are four terminals, χ0, χ1, χ2, and χ3, each of which observes one component of a vector source. Terminal χ0 wishes to generate two secret keys K1 and K2, respectively, with terminals χ1 and χ2 under the help of terminal χ3. All terminals are allowed to communicate over a public channel. An eavesdropper is assumed to have access to the public discussion. Both symmetric and asymmetric key generations are considered. In symmetric key generation models, model 1a (with a trusted helper) requires that the two keys are concealed from the eavesdropper, and model 1b (with an untrusted helper) further requires that the two keys are concealed from the helper in addition to the eavesdropper. The asymmetric key generation models 2a and 2b are the same as symmetric key generation models 1a and 1b, respectively, except that the key K2 is further required to be concealed from terminal χ1. For all models studied, the key capacity region is established by designing a unified achievable strategy to achieve the cut-set outer bounds. We also study the problem of generating more than two keys and characterize its key capacity region when all the cellular terminals are required to generate independent keys with the base station.

Original languageEnglish
Article number7891581
Pages (from-to)3804-3822
Number of pages19
JournalIEEE Transactions on Information Theory
Issue number6
StatePublished - Jun 2017


  • Fourier-Motzkin elimination
  • Secret key generation
  • cellular network
  • key capacity region
  • multiple keys

All Science Journal Classification (ASJC) codes

  • Information Systems
  • Computer Science Applications
  • Library and Information Sciences


Dive into the research topics of 'Multi-Key Generation over a Cellular Model with a Helper'. Together they form a unique fingerprint.

Cite this