Stealthy keyless secret key generation from degraded sources
Research output: Contribution to book/Conference proceedings/Anthology/Report › Conference contribution › Contributed › peer-review
Contributors
Abstract
To conceal the behavior of communications, we may adopt covert or stealthy communications under different scenarios and demands. However, when legitimate users have worse channels than the eavesdropper, the legitimate users may need additional keys to attain the concealment. Normal secret key generation (SKG) schemes may raise Willie's attention due to the public discussion breaking the concealment. Therefore, in this work, we investigate how to conceal the SKG itself, especially according to the stealth constraint. We prove that if the virtual channel between the common random source observed by the legitimate Alice and Bob, namely, X and Y, respectively, is more capable than that between Bob and Willie (the warden), namely, Y and Z, respectively, the same stealthy SK rate as in the case without stealth constraint can be achieved. Furthermore, if (X, Y, Z) form a Markov chain, then the key capacity of the SKG with the stealth constraint can be achieved for free.
Details
Original language | English |
---|---|
Title of host publication | Conference Record of 51st Asilomar Conference on Signals, Systems and Computers, ACSSC 2017 |
Editors | Michael B. Matthews |
Publisher | Institute of Electrical and Electronics Engineers Inc. |
Pages | 14-18 |
Number of pages | 5 |
ISBN (electronic) | 978-1-5386-1823-3 |
Publication status | Published - 2 Jul 2017 |
Peer-reviewed | Yes |
Publication series
Series | Asilomar Conference on Signals, Systems & Computers |
---|---|
Volume | 2017-October |
ISSN | 1058-6393 |
Conference
Title | 51st Asilomar Conference on Signals, Systems and Computers, ACSSC 2017 |
---|---|
Duration | 29 October - 1 November 2017 |
City | Pacific Grove |
Country | United States of America |
External IDs
ORCID | /0000-0002-1702-9075/work/165878322 |
---|