• DocumentCode
    1534097
  • Title

    Information-Theoretic Key Agreement of Multiple Terminals—Part II: Channel Model

  • Author

    Gohari, Amin Aminzadeh ; Anantharam, Venkat

  • Author_Institution
    Dept. of Electr. Eng. & Comput. Sci., Univ. of California, Berkeley, CA, USA
  • Volume
    56
  • Issue
    8
  • fYear
    2010
  • Firstpage
    3997
  • Lastpage
    4010
  • Abstract
    This is the second part of a two-part paper on information-theoretically secure secret key agreement. This part covers the secret key capacity under the channel model. In this model, multiple terminals wish to create a shared secret key that is secure from an eavesdropper with unlimited computational resources. The terminals are all connected to a noiseless and authenticated but insecure channel, called the “public channel.” Furthermore, the terminals have access to a secure but noisy discrete memoryless broadcast channel (DMBC). The first terminal can choose a sequence of inputs to the DMBC, which has outputs at the other terminals and at the eavesdropper. After each channel use, the terminals can engage in arbitrarily many rounds of interactive authenticated communication over the public channel. At the end, each legitimate terminal should be able to generate the secret key. In this paper, we derive new lower and upper bounds on the secrecy capacity. In each case, an example is provided to show that the new bound represents a strict improvement over the previously best known bound. This part of the paper is not standalone, and is written under the assumption that the reader has access to Part I, which is published in the same issue.
  • Keywords
    broadcast channels; channel capacity; telecommunication security; channel model; discrete memoryless broadcast channel; eavesdropper; information-theoretically secure secret key agreement; interactive authenticated communication; lower bounds; multiple terminals; public channel; secret key channel capacity; upper bounds; Broadcasting; Channel capacity; History; Information security; Information theory; Materials science and technology; Memoryless systems; Sun; Telecommunications; Upper bound; Channel model; common randomness; communication for omniscience; public discussion; secret key agreement; secret key capacity; security; source model; unconditional security;
  • fLanguage
    English
  • Journal_Title
    Information Theory, IEEE Transactions on
  • Publisher
    ieee
  • ISSN
    0018-9448
  • Type

    jour

  • DOI
    10.1109/TIT.2010.2050925
  • Filename
    5508612