Stealthy keyless secret key generation from degraded sources

Research output: Contribution to book/Conference proceedings/Anthology/ReportConference contributionContributedpeer-review

Contributors

Abstract

To conceal the behavior of communications, we may adopt covert or stealthy communications under different scenarios and demands. However, when legitimate users have worse channels than the eavesdropper, the legitimate users may need additional keys to attain the concealment. Normal secret key generation (SKG) schemes may raise Willie's attention due to the public discussion breaking the concealment. Therefore, in this work, we investigate how to conceal the SKG itself, especially according to the stealth constraint. We prove that if the virtual channel between the common random source observed by the legitimate Alice and Bob, namely, X and Y, respectively, is more capable than that between Bob and Willie (the warden), namely, Y and Z, respectively, the same stealthy SK rate as in the case without stealth constraint can be achieved. Furthermore, if (X, Y, Z) form a Markov chain, then the key capacity of the SKG with the stealth constraint can be achieved for free.

Details

Original languageEnglish
Title of host publicationConference Record of 51st Asilomar Conference on Signals, Systems and Computers, ACSSC 2017
EditorsMichael B. Matthews
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages14-18
Number of pages5
ISBN (electronic)978-1-5386-1823-3
Publication statusPublished - 2 Jul 2017
Peer-reviewedYes

Publication series

SeriesAsilomar Conference on Signals, Systems & Computers
Volume2017-October
ISSN1058-6393

Conference

Title51st Asilomar Conference on Signals, Systems and Computers, ACSSC 2017
Duration29 October - 1 November 2017
CityPacific Grove
CountryUnited States of America

External IDs

ORCID /0000-0002-1702-9075/work/165878322