Abstract
The problem of simultaneously generating a secret key (SK) and private key (PK) pair among three terminals via public discussion is investigated. In this problem, each terminal observes a component of correlated sources. All three terminals are required to generate the common SK to be concealed from an eavesdropper that has access to the public discussion, while two designated terminals are required to generate an extra PK to be concealed from both the eavesdropper and the remaining terminal. An outer bound on the SK-PK capacity region was established by Ye and Narayan, and was shown to be achievable for a special case. In this paper, the SK-PK capacity region is established in general by developing schemes to achieve the outer bound for the remaining two cases. The main technique lies in the novel design of a random binning-joint decoding scheme that achieves the existing outer bound.
Original language | English (US) |
---|---|
Article number | 6858050 |
Pages (from-to) | 6389-6398 |
Number of pages | 10 |
Journal | IEEE Transactions on Information Theory |
Volume | 60 |
Issue number | 10 |
DOIs | |
State | Published - Oct 1 2014 |
ASJC Scopus subject areas
- Information Systems
- Computer Science Applications
- Library and Information Sciences