Loading...

Key agreement over multiple access channel

Salimi, S ; Sharif University of Technology

410 Viewed
  1. Type of Document: Article
  2. DOI: 10.1109/TIFS.2011.2158310
  3. Abstract:
  4. In this paper, a generalized multiple access channel (MAC) model for secret key sharing between three terminals is considered. In this model, there are two transmitters and a receiver where all three terminals receive noisy channel outputs. In addition, there is a one-way public channel from the transmitters to the receiver. Each of the transmitters intends to share a secret key with the receiver by using the MAC and the public channel, where the transmitters are eavesdroppers with respect to each other. Two strategies for secret key sharing are considered, namely, the pregenerated key strategy and the two-stage key strategy. For both of them, inner and outer bounds of the secret key capacity region are derived. Furthermore, the effect of the public channel is discussed and the two strategies are compared. In both strategies, it is assumed that the channel outputs at the transmitters are only used for eavesdropping and not as inputs to the encoders. The effect of this assumption in the presence of the public channel is analyzed for some Gaussian MACs
  5. Keywords:
  6. Information theoretic security ; multiple access channel (MAC) ; secret key agreement ; secret key capacity region ; Capacity regions ; Channel output ; Gaussians ; Information-theoretic security ; Key agreement ; Multiple access channels ; Noisy channel ; Outer bounds ; Secret key ; Secret key sharing ; Two stage ; Information theory ; Transmitters
  7. Source: IEEE Transactions on Information Forensics and Security ; Volume 6, Issue 3 PART 1 , 2011 , Pages 775-790 ; 15566013 (ISSN)
  8. URL: http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=5782981&url=http%3A%2F%2Fieeexplore.ieee.org%2Fxpls%2Fabs_all.jsp%3Farnumber%3D5782981