Loading...

Multi-party secret key agreement over state-dependent wireless broadcast channels

Jafari Siavoshani, M ; Sharif University of Technology | 2016

290 Viewed
  1. Type of Document: Article
  2. DOI: 10.1109/TIFS.2016.2612649
  3. Publisher: Institute of Electrical and Electronics Engineers Inc , 2016
  4. Abstract:
  5. We consider a group of m trusted and authenticated nodes that aim to create a shared secret key K over a wireless channel in the presence of an eavesdropper Eve. We assume that there exists a state dependent wireless broadcast channel from one of the honest nodes to the rest of them including Eve. All of the trusted nodes can also discuss over a cost-free, noiseless and unlimited rate public channel which is also overheard by Eve. For this setup, we develop an information-theoretically secure secret key agreement protocol. We show the optimality of this protocol for "linear deterministic" wireless broadcast channels. This model generalizes the packet erasure model studied in literature for wireless broadcast channels. Here, the main idea is to convert a deterministic channel to multiple independent erasure channels by using superposition coding. For "state-dependent Gaussian" wireless broadcast channels, by using insights from the deterministic problem, we propose an achievability scheme based on a multi-layer wiretap code. By using the wiretap code, we can mimic the phenomenon of converting the wireless channel to multiple independent erasure channels. Then, finding the best achievable secret key generation rate leads to solving a non-convex power allocation problem over these channels (layers). We show that using a dynamic programming algorithm, one can obtain the best power allocation for this problem. Moreover, we prove the optimality of the proposed achievability scheme for the regime of high-SNR and large-dynamic range over the channel states in the (generalized) degrees of freedom sense
  6. Keywords:
  7. Broadcasting ; Codes (symbols) ; Communication channels (information theory) ; Cryptography ; Degrees of freedom (mechanics) ; Dynamic programming ; Information theory ; Information theoretical secrecy ; Multi terminals ; public discussion ; Secret key sharing ; Wireless channel ; Signal to noise ratio
  8. Source: IEEE Transactions on Information Forensics and Security ; Volume PP, Issue 99 , 2016 ; 15566013 (ISSN)
  9. URL: http://ieeexplore.ieee.org/document/7574374/?reload=true