@inproceedings{633e976eaf074237a497b104e2a5ff7c,
title = "Two-key generation for a cellular model with a helper",
abstract = "The problem of simultaneously generating two keys for a cellular model is investigated, in which each of four terminals, X0, X1, X2, and X3 observes one component of correlated sources. The terminal X0 wishes to generate secret keys K1 and K2 respectively, with terminals X1 and X2 under the help of terminal X3. They are allowed to communicate over a public channel. Both K1 and K2 are required to be concealed from an eavesdropper that has access to the public discussion. The key capacity region is established by designing a unified achievable strategy to achieve the cut-set outer bounds, which greatly simplifies the proof.",
keywords = "Cut-set bound, key capacity region, secret key generation, source model",
author = "Huishuai Zhang and Yingbin Liang and Lifeng Lai and Shlomo Shamai",
note = "Publisher Copyright: {\textcopyright} 2015 IEEE.; IEEE International Symposium on Information Theory, ISIT 2015 ; Conference date: 14-06-2015 Through 19-06-2015",
year = "2015",
month = sep,
day = "28",
doi = "10.1109/ISIT.2015.7282548",
language = "الإنجليزيّة",
series = "IEEE International Symposium on Information Theory - Proceedings",
pages = "715--719",
booktitle = "Proceedings - 2015 IEEE International Symposium on Information Theory, ISIT 2015",
}