Multiterminal Secret Key Agreement at Asymptotically Zero Discussion Rate

被引:0
|
作者
Chan, Chung [1 ]
Mukherjee, Manuj [5 ]
Kashyap, Navin [4 ]
Zhou, Qiaoqiao [2 ,3 ]
机构
[1] City Univ Hong Kong, Dept Comp Sci, Hong Kong, Hong Kong, Peoples R China
[2] Chinese Univ Hong Kong, Inst Network Coding, Hong Kong, Hong Kong, Peoples R China
[3] Chinese Univ Hong Kong, Dept Informat Engn, Hong Kong, Hong Kong, Peoples R China
[4] Indian Inst Sci, Dept Elect Commun Engn, Bangalore 560012, Karnataka, India
[5] Telecom Paristech, Digital Commun Grp, Commun & Elect Comelec Dept, Paris, France
关键词
COMMON INFORMATION; RANDOMNESS; GENERATION;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the multiterminal secret key agreement problem, a set of users want to discuss with each other until they share a common secret key independent of their discussion. We want to characterize the maximum secret key rate, called the secrecy capacity, asymptotically when the total discussion rate goes to zero. In the case of only two users, the capacity is equal to the Gacs-Korner common information. However, when there are more than two users, the capacity is unknown. It is plausible that a multivariate extension of the Gacs-Korner common information is the capacity, however, proving the converse is challenging. We resolved this for the hypergraphical sources and finite linear sources, and provide efficiently computable characterizations. We also give some ideas of extending the techniques to more general source models.
引用
收藏
页码:2654 / 2658
页数:5
相关论文
共 50 条
  • [31] MULTITERMINAL DETECTION WITH ZERO-RATE DATA-COMPRESSION
    SHALABY, HMH
    PAPAMARCOU, A
    IEEE TRANSACTIONS ON INFORMATION THEORY, 1992, 38 (02) : 254 - 267
  • [32] A secret-key exponential key agreement protocol with smart cards
    Yoon, Eun-Jun
    Yoo, Kee-Young
    AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2007, 4610 : 430 - +
  • [33] Robust authentication and key agreement scheme preserving the privacy of secret key
    Wang, Ren-Chiun
    Juang, Wen-Shenq
    Lei, Chin-Laung
    COMPUTER COMMUNICATIONS, 2011, 34 (03) : 274 - 280
  • [34] Secret Key Generation and Agreement in UWB Communication Channels
    Madiseh, Masoud Ghoreishi
    McGuire, Michael L.
    Neville, Stephen S.
    Cai, Lin
    Horie, Michael
    GLOBECOM 2008 - 2008 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2008,
  • [35] Secret Key Agreement for Data Dissemination in Vehicular Platoons
    Li, Kai
    Lu, Lingyun
    Ni, Wei
    Tovar, Eduardo
    Guizani, Mohsen
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2019, 68 (09) : 9060 - 9073
  • [36] Universal Multiparty Data Exchange and Secret Key Agreement
    Tyagi, Himanshu
    Watanabe, Shun
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2017, 63 (07) : 4057 - 4074
  • [37] Secret Key Agreement using a Virtual Wiretap Channel
    Sharifian, Setareh
    Lin, Fuchun
    Safavi-Naini, Reihaneh
    IEEE INFOCOM 2017 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, 2017,
  • [38] Secret Key Agreement Based on Secure Polar Code
    Zhang Shengjun
    Zhong Zhou
    Jin Liang
    Huang Kaizhi
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2019, 41 (06) : 1413 - 1419
  • [39] SECRET KEY AGREEMENT: FUNDAMENTAL LIMITS AND PRACTICAL CHALLENGES
    Rezki, Zouheir
    Zorgui, Marwen
    Alomair, Basel
    Alouini, Mohamed-Slim
    IEEE WIRELESS COMMUNICATIONS, 2017, 24 (03) : 72 - 79
  • [40] AN APPLICATION OF ST-NUMBERING TO SECRET KEY AGREEMENT
    Mizuki, Takaaki
    Nakayama, Satoru
    Sone, Hideaki
    INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2011, 22 (05) : 1211 - 1227