Helper-assisted asymmetric two key generation

Huishuai Zhang, Yingbin Liang, Lifeng Lai

Research output: Chapter in Book/Entry/PoemConference contribution

Abstract

The problem of simultaneously generating an asymmetric key pair with assistance of a helper is studied. In this setting, each of four terminals, i.e., a base station X0, two cellular nodes X1 and X2, and a helper X3, observes a component of correlated sources. The cellular nodes X1 and X2 wish to generate secret keys K1 and K2 with the base station X0, respectively, under the help of terminal X3. Both keys should be concealed from an eavesdropper that has access to the public discussion, while K2 is also required to be concealed from terminal X1. An outer bound on the key capacity region is derived. It is shown to be achievable under certain condition, and hence the key capacity region is characterized under such condition.

Original languageEnglish (US)
Title of host publicationConference Record of the 48th Asilomar Conference on Signals, Systems and Computers
EditorsMichael B. Matthews
PublisherIEEE Computer Society
Pages65-69
Number of pages5
ISBN (Electronic)9781479982974
DOIs
StatePublished - Apr 24 2015
Event48th Asilomar Conference on Signals, Systems and Computers, ACSSC 2015 - Pacific Grove, United States
Duration: Nov 2 2014Nov 5 2014

Publication series

NameConference Record - Asilomar Conference on Signals, Systems and Computers
Volume2015-April
ISSN (Print)1058-6393

Other

Other48th Asilomar Conference on Signals, Systems and Computers, ACSSC 2015
Country/TerritoryUnited States
CityPacific Grove
Period11/2/1411/5/14

ASJC Scopus subject areas

  • Signal Processing
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Helper-assisted asymmetric two key generation'. Together they form a unique fingerprint.

Cite this