Stealthy keyless secret key generation from degraded sources

Publikation: Beitrag in Buch/Konferenzbericht/Sammelband/GutachtenBeitrag in KonferenzbandBeigetragenBegutachtung

Beitragende

Abstract

To conceal the behavior of communications, we may adopt covert or stealthy communications under different scenarios and demands. However, when legitimate users have worse channels than the eavesdropper, the legitimate users may need additional keys to attain the concealment. Normal secret key generation (SKG) schemes may raise Willie's attention due to the public discussion breaking the concealment. Therefore, in this work, we investigate how to conceal the SKG itself, especially according to the stealth constraint. We prove that if the virtual channel between the common random source observed by the legitimate Alice and Bob, namely, X and Y, respectively, is more capable than that between Bob and Willie (the warden), namely, Y and Z, respectively, the same stealthy SK rate as in the case without stealth constraint can be achieved. Furthermore, if (X, Y, Z) form a Markov chain, then the key capacity of the SKG with the stealth constraint can be achieved for free.

Details

OriginalspracheEnglisch
TitelConference Record of 51st Asilomar Conference on Signals, Systems and Computers, ACSSC 2017
Redakteure/-innenMichael B. Matthews
Herausgeber (Verlag)Institute of Electrical and Electronics Engineers Inc.
Seiten14-18
Seitenumfang5
ISBN (elektronisch)978-1-5386-1823-3
PublikationsstatusVeröffentlicht - 2 Juli 2017
Peer-Review-StatusJa

Publikationsreihe

ReiheAsilomar Conference on Signals, Systems & Computers
Band2017-October
ISSN1058-6393

Konferenz

Titel51st Asilomar Conference on Signals, Systems and Computers, ACSSC 2017
Dauer29 Oktober - 1 November 2017
StadtPacific Grove
LandUSA/Vereinigte Staaten

Externe IDs

ORCID /0000-0002-1702-9075/work/165878322