Information-theoretic key agreement of multiple terminal: part II: channel model

نویسندگان

  • Amin Aminzadeh Gohari
  • Venkat Anantharam
چکیده

This is the second part of a two-part paper on information-theoretically secure secret key agreement. This paper focuses on the secret key rate problem under the channel model. In the channel model, a set of two or more terminals wish to create a shared secret key that is information-theoretically secure from an eavesdropper. The first terminal can choose a sequence of inputs to a discrete memoryless broadcast channel, which has outputs at the other terminals and at the eavesdropper. After each channel use, the terminals can engage in arbitrarily many rounds of interactive authenticated communication over a public channel; thus, each input by the first terminal can depend on the previous inputs and the public communication so far. At the end of the process each terminal should be able to generate the key. We introduce a technique for proving that a given expression bounds the secrecy rate from above. Using this technique, a new upper bound on the secrecy rate in the general multi-terminal case is proposed that strictly improves the currently best known upper bound. We also derive a new lower bound on the secrecy rate and prove that it strictly improves what is essentially the best known lower bound.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Information-Theoretic Key Agreement of Multiple Terminals - Part II: Channel Model

This is the second part of a two-part paper on information-theoretically secure secret key agreement. This part covers the secret key capacity under the channel model. In this model, multiple terminals wish to create a shared secret key that is secure from an eavesdropper with unlimited computational resources. The terminals are all connected to a noiseless and authenticated but unsecure channe...

متن کامل

Information-theoretic key agreement of multiple terminals: part I

We study the problem of information-theoretically secure secret key agreement under the well-known source model and channel model. In both of these models multiple terminals wish to create a shared secret key that is secure from an eavesdropper with unlimited computational resources. The terminals are all connected to a noiseless and authenticated but public communication channel. The terminals...

متن کامل

Information-Theoretic Key Agreement of Multiple Terminals - Part I: Source Model

This is the first part of a two-part paper on information-theoretically secure secret key agreement. In this part, we study the secrecy problem under the widely studied source model. In the source model the terminals wishing to generate a secret key, as well as the eavesdropper, receive the respective coordinates of a block of independent and identically distributed copies of jointly distribute...

متن کامل

Generalizing Multiple Access Wiretap and Wiretap II Channel Models: Achievable Rates and Cost of Strong Secrecy

In this paper, new two-user multiple access wiretap channel models are studied. First, the multiple access wiretap channel II with a discrete memoryless main channel, under three different wiretapping scenarios, is introduced. The wiretapper, as in the classical wiretap channel II model, chooses a fixedlength subset of the channel uses on which she obtains noise-free observations of one of the ...

متن کامل

Extension of the Coverage Region of Multiple Access Channels by Using a Relay

From practical and theoretical viewpoints, performance analysis of communication systems by using information-theoretic results is important. In this paper, based on our previous work on Multiple Access Channel (MAC) and Multiple Access Relay Channel (MARC), we analyze the impact of a relay on the fundamental wireless communications concept, i.e., coverage region of MARC, as a basic model for u...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IEEE Trans. Information Theory

دوره 56  شماره 

صفحات  -

تاریخ انتشار 2010