Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Secret key sharing in a new source model: Rate regions
Sharif University of Technology, Tehran, Iran.
2010 (English)In: 2010 Australian Communications Theory Workshop, AusCTW 2010, IEEE , 2010, 117-122 p.Conference paper, Published paper (Refereed)
Abstract [en]

A source model for secret key generation between terminals is considered. Two users, namely users 1 and 2, at one side communicate with another user, namely user 3, at the other side via public channels where three users can observe i.i.d outputs of correlated sources. Each of users 1 and 2 intends to share a secret key with user 3 where user 1 acts as a wiretapper for user 2 and vice versa. In this model, two situations are considered: communication from users 1 and 2 to user 3 (forward key strategy) and from user 3 to users 1 and 2 (backward key strategy). This model is motivated by wireless communications when considering user 3 as a base station and users 1 and 2 as network users. In this paper, for both forward and backward key strategies, inner and outer bounds of secret key capacity regions are derived. In special attitudes where one of users 1 and 2 are only interested in wiretapping and not key sharing, our results agree with that of Ahlswede and Csiszar. Also, we investigate some special cases in which inner bound coincides on outer bound and secret key capacity region is deduced.

Place, publisher, year, edition, pages
IEEE , 2010. 117-122 p.
Keyword [en]
Information theoretic security, Secret key rate region, Secret key sharing in source model
National Category
Electrical Engineering, Electronic Engineering, Information Engineering
Identifiers
URN: urn:nbn:se:kth:diva-96780DOI: 10.1109/AUSCTW.2010.5426771Scopus ID: 2-s2.0-77951482183ISBN: 978-142445433-4 (print)OAI: oai:DiVA.org:kth-96780DiVA: diva2:532654
Conference
2010 Australian Communications Theory Workshop, AusCTW 2010;Canberra, ACT;3 February 2010 through 5 February 2010
Note
QC 20120620Available from: 2012-06-12 Created: 2012-06-12 Last updated: 2012-06-20Bibliographically approved

Open Access in DiVA

No full text

Other links

Publisher's full textScopus

Search in DiVA

By author/editor
Salimi, Somayeh
Electrical Engineering, Electronic Engineering, Information Engineering

Search outside of DiVA

GoogleGoogle Scholar

doi
isbn
urn-nbn

Altmetric score

doi
isbn
urn-nbn
Total: 30 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf