The capacity region of the source-type model for secret key and private key generation

Huishuai Zhang, Lifeng Lai, Yingbin Liang, Hua Wang

Research output: Contribution to journalArticle

19 Scopus citations

Abstract

The problem of simultaneously generating a secret key (SK) and private key (PK) pair among three terminals via public discussion is investigated. In this problem, each terminal observes a component of correlated sources. All three terminals are required to generate the common SK to be concealed from an eavesdropper that has access to the public discussion, while two designated terminals are required to generate an extra PK to be concealed from both the eavesdropper and the remaining terminal. An outer bound on the SK-PK capacity region was established by Ye and Narayan, and was shown to be achievable for a special case. In this paper, the SK-PK capacity region is established in general by developing schemes to achieve the outer bound for the remaining two cases. The main technique lies in the novel design of a random binning-joint decoding scheme that achieves the existing outer bound.

Original languageEnglish (US)
Article number6858050
Pages (from-to)6389-6398
Number of pages10
JournalIEEE Transactions on Information Theory
Volume60
Issue number10
DOIs
StatePublished - Oct 1 2014

ASJC Scopus subject areas

  • Information Systems
  • Computer Science Applications
  • Library and Information Sciences

Fingerprint Dive into the research topics of 'The capacity region of the source-type model for secret key and private key generation'. Together they form a unique fingerprint.

  • Cite this