Cooperative Two-Key Generation in Source-Type Model With Partial-Trusted Helpers
Title | Cooperative Two-Key Generation in Source-Type Model With Partial-Trusted Helpers |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Gong, Shixun, Li, Na, Wu, Huici, Tao, Xiaofeng |
Conference Name | 2019 IEEE/CIC International Conference on Communications in China (ICCC) |
ISBN Number | 978-1-7281-0732-5 |
Keywords | channel capacity, cooperative communication, cooperative key generation, cooperative two-key generation, Decoding, discrete memoryless sources, five-terminal system, generated keys, Human Behavior, human factors, Indexes, information theoretic security, information-theoretic security, key capacity region, key leakage rate, Metrics, partial-trusted helpers, passive eavesdropper, physical layer security, policy-based governance, pubcrawl, public channel, public key cryptography, Relays, resilience, Resiliency, Scalability, secret keys, security, source coding, source coding scheme, source sequences, source-type model, telecommunication security, Telecommunications, trusted helper, untrusted helper, Upper bound |
Abstract | This paper investigates the problem of generating two secret keys (SKs) simultaneously over a five-terminal system with terminals labelled as 1, 2, 3, 4 and 5. Each of terminal 2 and terminal 3 wishes to generate an SK with terminal 1 over a public channel wiretapped by a passive eavesdropper. Terminal 4 and terminal 5 respectively act as a trusted helper and an untrusted helper to assist the SK generation. All the terminals observe correlated source sequences from discrete memoryless sources (DMS) and can exchange information over a public channel with no rate constraint that the eavesdropper has access to. Based on the considered model, key capacity region is fully characterized and a source coding scheme that can achieve the capacity region is provided. Furthermore, expression for key leakage rate is obtained to analyze the security performance of the two generated keys. |
URL | https://ieeexplore.ieee.org/document/8855964 |
DOI | 10.1109/ICCChina.2019.8855964 |
Citation Key | gong_cooperative_2019 |
- source coding
- pubcrawl
- public channel
- public key cryptography
- Relays
- resilience
- Resiliency
- Scalability
- secret keys
- security
- policy-based governance
- source coding scheme
- source sequences
- source-type model
- telecommunication security
- Telecommunications
- trusted helper
- untrusted helper
- Upper bound
- Indexes
- cooperative communication
- cooperative key generation
- cooperative two-key generation
- Decoding
- discrete memoryless sources
- five-terminal system
- generated keys
- Human behavior
- Human Factors
- channel capacity
- information theoretic security
- information-theoretic security
- key capacity region
- key leakage rate
- Metrics
- partial-trusted helpers
- passive eavesdropper
- physical layer security