Stealthy keyless secret key generation from degraded sources
Publikation: Beitrag in Buch/Konferenzbericht/Sammelband/Gutachten › Beitrag in Konferenzband › Beigetragen › Begutachtung
Beitragende
Abstract
To conceal the behavior of communications, we may adopt covert or stealthy communications under different scenarios and demands. However, when legitimate users have worse channels than the eavesdropper, the legitimate users may need additional keys to attain the concealment. Normal secret key generation (SKG) schemes may raise Willie's attention due to the public discussion breaking the concealment. Therefore, in this work, we investigate how to conceal the SKG itself, especially according to the stealth constraint. We prove that if the virtual channel between the common random source observed by the legitimate Alice and Bob, namely, X and Y, respectively, is more capable than that between Bob and Willie (the warden), namely, Y and Z, respectively, the same stealthy SK rate as in the case without stealth constraint can be achieved. Furthermore, if (X, Y, Z) form a Markov chain, then the key capacity of the SKG with the stealth constraint can be achieved for free.
Details
Originalsprache | Englisch |
---|---|
Titel | Conference Record of 51st Asilomar Conference on Signals, Systems and Computers, ACSSC 2017 |
Redakteure/-innen | Michael B. Matthews |
Herausgeber (Verlag) | Institute of Electrical and Electronics Engineers Inc. |
Seiten | 14-18 |
Seitenumfang | 5 |
ISBN (elektronisch) | 978-1-5386-1823-3 |
Publikationsstatus | Veröffentlicht - 2 Juli 2017 |
Peer-Review-Status | Ja |
Publikationsreihe
Reihe | Asilomar Conference on Signals, Systems & Computers |
---|---|
Band | 2017-October |
ISSN | 1058-6393 |
Konferenz
Titel | 51st Asilomar Conference on Signals, Systems and Computers, ACSSC 2017 |
---|---|
Dauer | 29 Oktober - 1 November 2017 |
Stadt | Pacific Grove |
Land | USA/Vereinigte Staaten |
Externe IDs
ORCID | /0000-0002-1702-9075/work/165878322 |
---|