Loading...

Simultaneously generating multiple keys in a four-terminal network

Babaheidarian, P ; Sharif University of Technology | 2012

531 Viewed
  1. Type of Document: Article
  2. DOI: 10.1049/iet-ifs.2011.0232
  3. Publisher: IET , 2012
  4. Abstract:
  5. A source model including four terminals is considered, where three simultaneously generating three types of keys are intended. Terminals 1, 2 and 3 wish to share a common key, the secret key, which should be kept secret from terminal 4 and simultaneously terminals 1 and 2 intend to share a private key with terminal 3, which should be kept secret from each other. Also, all the keys should be concealed from terminal 4 (the external wiretapper). The authors assume that all terminals including the external wiretapper have access to distinct correlated i.i.d. sources; there is also a noiseless public channel with unlimited capacity among the terminals. The authors have investigated the model on two scenarios of key sharing depending on the direction of the public channel. Rate regions of the keys are derived. It is shown that in some special cases the inner and outer bounds of the capacity regions coincide and the capacity regions are derived
  6. Keywords:
  7. Capacity regions ; Key sharing ; Multiple keys ; Outer bounds ; Private key ; Rate regions ; Secret key ; Source models ; Computer networks ; Information systems ; Security of data ; Access control
  8. Source: IET Information Security ; Volume 6, Issue 3 , 2012 , Pages 190-201 ; 17518709 (ISSN)
  9. URL: http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=6397164&url=http%3A%2F%2Fieeexplore.ieee.org%2Fxpls%2Fabs_all.jsp%3Farnumber%3D6397164