Stealthy Secret Key Generation

被引:3
|
作者
Lin, Pin-Hsun [1 ]
Janda, Carsten R. [1 ]
Jorswieck, Eduard A. [1 ]
Schaefer, Rafael F. [2 ]
机构
[1] Tech Univ Carolo Wilhelmina Braunschweig, Informat Theory & Commun Syst Dept, D-38106 Braunschweig, Germany
[2] Tech Univ Berlin, Informat Theory & Applicat Chair, D-10623 Berlin, Germany
关键词
secret key generation; source model; stealthy communications; covert communications; channel resolvability; conceptual wiretap channel; stochastically degraded; stochastic orders; COMMUNICATION; AGREEMENT;
D O I
10.3390/e22060679
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
In order to make a warden, Willie, unaware of the existence of meaningful communications, there have been different schemes proposed including covert and stealth communications. When legitimate users have no channel advantage over Willie, the legitimate users may need additional secret keys to confuse Willie, if the stealth or covert communication is still possible. However, secret key generation (SKG) may raise Willie's attention since it has a public discussion, which is observable by Willie. To prevent Willie's attention, we consider the source model for SKG under a strong secrecy constraint, which has further to fulfill a stealth constraint. Our first contribution is that, if the stochastic dependence between the observations at Alice and Bob fulfills the strict more capable criterion with respect to the stochastic dependence between the observations at Alice and Willie or between Bob and Willie, then a positive stealthy secret key rate is identical to the one without the stealth constraint. Our second contribution is that, if the random variables observed at Alice, Bob, and Willie induced by the common random source form a Markov chain, then the key capacity of the source model SKG with the strong secrecy constraint and the stealth constraint is equal to the key capacity with the strong secrecy constraint, but without the stealth constraint. For the case of fast fading models, a sufficient condition for the existence of an equivalent model, which is degraded, is provided, based on stochastic orders. Furthermore, we present an example to illustrate our results.
引用
收藏
页数:14
相关论文
共 50 条
  • [31] Physical Layer Secret Key Generation in Static Environments
    Aldaghri, Nasser
    Mahdavifar, Hessam
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 : 2692 - 2705
  • [32] On Secret Key Generation From Finite Source Observations
    Tu, Wenwen
    Lai, Lifeng
    2014 48TH ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS (CISS), 2014,
  • [33] Secret Key Generation by Continuous Encryption Before Quantization
    Maksud, Ahmed
    Hua, Yingbo
    IEEE SIGNAL PROCESSING LETTERS, 2022, 29 : 1497 - 1501
  • [34] IRS-Assisted Hybrid Secret Key Generation
    Zhang, Meixiang
    Zhuang, Ziyue
    Kim, Sooyoung
    SYMMETRY-BASEL, 2023, 15 (10):
  • [35] Filterbank Secret Key Generation Rates in Multipath Channels
    Mitev, Miroslav
    Barreto, Andre N.
    Pham, Thuy M.
    Matthe, Maximilian
    Fettweis, Gerhard
    2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022), 2022, : 4057 - 4062
  • [36] On Secret Key Generation through Multipath for Wireless Networks
    Katselis, Dimitrios
    Papadimitratos, Panos
    2013 IEEE INTERNATIONAL SYMPOSIUM ON SIGNAL PROCESSING AND INFORMATION TECHNOLOGY (IEEE ISSPIT 2013), 2013, : 148 - 153
  • [37] Secret Key Generation for a Pairwise Independent Network Model
    Nitinawarat, Sirin
    Ye, Chunxuan
    Barg, Alexander
    Narayan, Prakash
    Reznik, Alex
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2010, 56 (12) : 6482 - 6489
  • [38] Intelligent Reflecting Surface Assisted Secret Key Generation
    Lu, Xinjin
    Lei, Jing
    Shi, Yuxin
    Li, Wei
    IEEE SIGNAL PROCESSING LETTERS, 2021, 28 : 1036 - 1040
  • [39] Unification of Secret Key Generation and Wiretap Channel Transmission
    Hua, Yingbo
    Rahman, Md Saydur
    ICC 2024 - IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2024, : 3755 - 3760
  • [40] Secret Key Generation Based on Channel and Distance Measurements
    Badawy, Ahmed
    Khattab, Tamer
    ElFouly, Tarek
    Mohamed, Amr
    Trinchero, Daniele
    2014 6TH INTERNATIONAL CONGRESS ON ULTRA MODERN TELECOMMUNICATIONS AND CONTROL SYSTEMS AND WORKSHOPS (ICUMT), 2014, : 136 - 142