Two-key generation for a cellular model with a helper

Huishuai Zhang, Yingbin Liang, Lifeng Lai, Shlomo Shamai

Research output: Chapter in Book/Entry/PoemConference contribution

2 Scopus citations

Abstract

The problem of simultaneously generating two keys for a cellular model is investigated, in which each of four terminals, X0, X1, X2, and X3 observes one component of correlated sources. The terminal X0 wishes to generate secret keys K1 and K2 respectively, with terminals X1 and X2 under the help of terminal X3. They are allowed to communicate over a public channel. Both K1 and K2 are required to be concealed from an eavesdropper that has access to the public discussion. The key capacity region is established by designing a unified achievable strategy to achieve the cut-set outer bounds, which greatly simplifies the proof.

Original languageEnglish (US)
Title of host publicationProceedings - 2015 IEEE International Symposium on Information Theory, ISIT 2015
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages715-719
Number of pages5
ISBN (Electronic)9781467377041
DOIs
StatePublished - Sep 28 2015
EventIEEE International Symposium on Information Theory, ISIT 2015 - Hong Kong, Hong Kong
Duration: Jun 14 2015Jun 19 2015

Publication series

NameIEEE International Symposium on Information Theory - Proceedings
Volume2015-June
ISSN (Print)2157-8095

Other

OtherIEEE International Symposium on Information Theory, ISIT 2015
Country/TerritoryHong Kong
CityHong Kong
Period6/14/156/19/15

Keywords

  • Cut-set bound
  • key capacity region
  • secret key generation
  • source model

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Information Systems
  • Modeling and Simulation
  • Applied Mathematics

Fingerprint

Dive into the research topics of 'Two-key generation for a cellular model with a helper'. Together they form a unique fingerprint.

Cite this