• DocumentCode
    1173191
  • Title

    Secrecy capacities for multiple terminals

  • Author

    Csiszár, Imre ; Narayan, Prakash

  • Author_Institution
    A. Renyi Inst. of Math., Hungarian Acad. of Sci., Budapest, Hungary
  • Volume
    50
  • Issue
    12
  • fYear
    2004
  • Firstpage
    3047
  • Lastpage
    3061
  • Abstract
    We derive single-letter characterizations of (strong) secrecy capacities for models with an arbitrary number of terminals, each of which observes a distinct component of a discrete memoryless multiple source, with unrestricted and interactive public communication permitted between the terminals. A subset of these terminals can serve as helpers for the remaining terminals in generating secrecy. According to the extent of an eavesdropper´s knowledge, three kinds of secrecy capacity are considered: secret key (SK), private key (PK), and wiretap secret key (WSK) capacity. The characterizations of the SK and PK capacities highlight the innate connections between secrecy generation and multiterminal source coding without secrecy requirements. A general upper bound for WSK capacity is derived which is tight in the case when the eavesdropper can wiretap noisy versions of the components of the underlying multiple source, provided randomization is permitted at the terminals. These secrecy capacities are seen to be achievable with noninteractive communication between the terminals. The achievability results are also shown to be universal.
  • Keywords
    cryptography; memoryless systems; random processes; telecommunication security; Slepian-Wolf constraint; discrete memoryless multiple source; eavesdropper knowledge; interactive public communication; multiple terminals; multiterminal source coding; noninteractive communication; private key capacity; public discussion; random process; secrecy capacity; secrecy generation; secret key capacity; security index; wiretap secret key capacity; Character generation; Information theory; Mathematics; Mutual information; Random variables; Security; Source coding; Upper bound; 211;Wolf constraints; 65; Common randomness; Slepian&#; multiple source; private key; public discussion; secrecy capacity; security index; wiretap;
  • fLanguage
    English
  • Journal_Title
    Information Theory, IEEE Transactions on
  • Publisher
    ieee
  • ISSN
    0018-9448
  • Type

    jour

  • DOI
    10.1109/TIT.2004.838380
  • Filename
    1362897