• DocumentCode
    37096
  • Title

    Secrecy Generation for Multiaccess Channel Models

  • Author

    Csiszár, Imre ; Narayan, Prakash

  • Author_Institution
    A. Renyi Inst. of Math., Budapest, Hungary
  • Volume
    59
  • Issue
    1
  • fYear
    2013
  • fDate
    Jan. 2013
  • Firstpage
    17
  • Lastpage
    31
  • Abstract
    Shannon theoretic secret key generation by several parties is considered for models in which a secure noisy channel with multiple input and output terminals and a public noiseless channel of unlimited capacity are available for accomplishing this goal. The secret key is generated for a set A of terminals of the noisy channel, with the remaining terminals (if any) cooperating in this task through their public communication. Single-letter lower and upper bounds for secrecy capacities are obtained when secrecy is required from an eavesdropper that observes only the public communication and perhaps also a set of terminals disjoint from A. These bounds coincide in special cases, but not in general. We also consider models in which different sets of terminals share multiple keys, one for the terminals in each set with secrecy required from the eavesdropper as well as from the terminals not in this set. Partial results include showing links among the associated secrecy capacity region for multiple keys, the transmission capacity region of the multiple access channel defined by the secure noisy channel, and achievable rates for a single secret key for all the terminals.
  • Keywords
    cryptography; multi-access systems; radio links; telecommunication security; wireless channels; Shannon theoretic secret key generation; eavesdropper; input terminal; links; multiaccess channel model; multiple access channel; output terminal; public communication; public noiseless channel; secrecy capacity; secrecy generation; secure noisy channel; single-letter lower bound; single-letter upper bound; transmission capacity region; Channel models; Emulation; Joints; Noise measurement; Protocols; Radio frequency; Upper bound; Multiaccess channel; multiple keys; private key; private key capacity region; secrecy capacity; secret key; source emulation;
  • fLanguage
    English
  • Journal_Title
    Information Theory, IEEE Transactions on
  • Publisher
    ieee
  • ISSN
    0018-9448
  • Type

    jour

  • DOI
    10.1109/TIT.2012.2216254
  • Filename
    6290395