Stealthy Secret Key Generation

被引:3
|
作者
Lin, Pin-Hsun [1 ]
Janda, Carsten R. [1 ]
Jorswieck, Eduard A. [1 ]
Schaefer, Rafael F. [2 ]
机构
[1] Tech Univ Carolo Wilhelmina Braunschweig, Informat Theory & Commun Syst Dept, D-38106 Braunschweig, Germany
[2] Tech Univ Berlin, Informat Theory & Applicat Chair, D-10623 Berlin, Germany
关键词
secret key generation; source model; stealthy communications; covert communications; channel resolvability; conceptual wiretap channel; stochastically degraded; stochastic orders; COMMUNICATION; AGREEMENT;
D O I
10.3390/e22060679
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
In order to make a warden, Willie, unaware of the existence of meaningful communications, there have been different schemes proposed including covert and stealth communications. When legitimate users have no channel advantage over Willie, the legitimate users may need additional secret keys to confuse Willie, if the stealth or covert communication is still possible. However, secret key generation (SKG) may raise Willie's attention since it has a public discussion, which is observable by Willie. To prevent Willie's attention, we consider the source model for SKG under a strong secrecy constraint, which has further to fulfill a stealth constraint. Our first contribution is that, if the stochastic dependence between the observations at Alice and Bob fulfills the strict more capable criterion with respect to the stochastic dependence between the observations at Alice and Willie or between Bob and Willie, then a positive stealthy secret key rate is identical to the one without the stealth constraint. Our second contribution is that, if the random variables observed at Alice, Bob, and Willie induced by the common random source form a Markov chain, then the key capacity of the source model SKG with the strong secrecy constraint and the stealth constraint is equal to the key capacity with the strong secrecy constraint, but without the stealth constraint. For the case of fast fading models, a sufficient condition for the existence of an equivalent model, which is degraded, is provided, based on stochastic orders. Furthermore, we present an example to illustrate our results.
引用
收藏
页数:14
相关论文
共 50 条
  • [1] Stealthy Secret Key Generation
    Lin, Pin-Hsun
    Janda, Carsten Rudolf
    Jorswieck, Eduard Axel
    2017 IEEE GLOBAL CONFERENCE ON SIGNAL AND INFORMATION PROCESSING (GLOBALSIP 2017), 2017, : 492 - 496
  • [2] Stealthy Keyless Secret Key Generation from Degraded Sources
    Lin, Pin-Hsun
    Janda, Carsten R.
    Jorswieck, Eduard A.
    Schaefer, Rafael F.
    2017 FIFTY-FIRST ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS, AND COMPUTERS, 2017, : 14 - 18
  • [3] Covert Secret Key Generation
    Tahmasbi, Mehrdad
    Bloch, Matthieu R.
    2017 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2017, : 540 - 544
  • [4] Secret Key Generation From Mobility
    Gungor, Onur
    Chen, Fangzhou
    Koksal, C. Emre
    2011 IEEE GLOBECOM WORKSHOPS (GC WKSHPS), 2011, : 874 - 878
  • [5] Secret Key Generation Through a Relay
    Kittichokechai, Kittipong
    Schaefer, Rafael F.
    Caire, Giuseppe
    2016 IEEE INFORMATION THEORY WORKSHOP (ITW), 2016,
  • [6] Channel Estimation for Secret Key Generation
    McGuire, Michael
    2014 IEEE 28TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2014, : 490 - 496
  • [7] Secret Key Generation With Limited Interaction
    Liu, Jingbo
    Cuff, Paul
    Verdu, Sergio
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2017, 63 (11) : 7358 - 7381
  • [8] Secret Key Generation With Multiantenna Relays
    Sandell, Magnus
    IEEE ACCESS, 2023, 11 : 8387 - 8396
  • [9] Group secret key generation algorithms
    Ye, Chunxuan
    Reznik, Alex
    2007 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS, VOLS 1-7, 2007, : 2596 - 2600
  • [10] Key Generation for Multi-Secret Steganography
    Koptyra, Katarzyna
    Ogiela, Marek R.
    2015 2ND INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND SECURITY (ICISS), 2015, : 1 - 4