Stealthy Secret Key Generation

dc.contributor.authorLin, Pin-Hsun
dc.contributor.authorJanda, Carsten R.
dc.contributor.authorJorswieck, Eduard A.
dc.contributor.authorSchaefer, Rafael F.
dc.date.accessioned2020-11-19T10:03:17Z
dc.date.available2020-11-19T10:03:17Z
dc.date.issued2020-06-18
dc.date.updated2020-07-12T03:02:33Z
dc.description.abstractIn order to make a warden, Willie, unaware of the existence of meaningful communications, there have been different schemes proposed including covert and stealth communications. When legitimate users have no channel advantage over Willie, the legitimate users may need additional secret keys to confuse Willie, if the stealth or covert communication is still possible. However, secret key generation (SKG) may raise Willie’s attention since it has a public discussion, which is observable by Willie. To prevent Willie’s attention, we consider the source model for SKG under a strong secrecy constraint, which has further to fulfill a stealth constraint. Our first contribution is that, if the stochastic dependence between the observations at Alice and Bob fulfills the strict more capable criterion with respect to the stochastic dependence between the observations at Alice and Willie or between Bob and Willie, then a positive stealthy secret key rate is identical to the one without the stealth constraint. Our second contribution is that, if the random variables observed at Alice, Bob, and Willie induced by the common random source form a Markov chain, then the key capacity of the source model SKG with the strong secrecy constraint and the stealth constraint is equal to the key capacity with the strong secrecy constraint, but without the stealth constraint. For the case of fast fading models, a sufficient condition for the existence of an equivalent model, which is degraded, is provided, based on stochastic orders. Furthermore, we present an example to illustrate our results.en
dc.description.sponsorshipBMBF, 16KIS1004, Verbundprojekt: Post Shannon Kommunikation - NewCom -; Teilvorhaben: Physikalische Dienste-Integrations-Konzepte für neue Kommunikationsmodelleen
dc.identifier.eissn1099-4300
dc.identifier.urihttps://depositonce.tu-berlin.de/handle/11303/12030
dc.identifier.urihttp://dx.doi.org/10.14279/depositonce-10910
dc.language.isoenen
dc.rights.urihttps://creativecommons.org/licenses/by/4.0/en
dc.subject.ddc000 Informatik, Informationswissenschaft, allgemeine Werkede
dc.subject.othersecret key generationen
dc.subject.othersource modelen
dc.subject.otherstealthy communicationsen
dc.subject.othercovert communicationsen
dc.subject.otherchannel resolvabilityen
dc.subject.otherconceptual wiretap channelen
dc.subject.otherstochastically degradeden
dc.subject.otherstochastic ordersen
dc.titleStealthy Secret Key Generationen
dc.typeArticleen
dc.type.versionpublishedVersionen
dcterms.bibliographicCitation.articlenumber679en
dcterms.bibliographicCitation.doi10.3390/e22060679en
dcterms.bibliographicCitation.issue6en
dcterms.bibliographicCitation.journaltitleEntropyen
dcterms.bibliographicCitation.originalpublishernameMDPIen
dcterms.bibliographicCitation.originalpublisherplaceBaselen
dcterms.bibliographicCitation.volume22en
tub.accessrights.dnbfreeen
tub.affiliationFak. 4 Elektrotechnik und Informatik::Inst. Telekommunikationssysteme::FG Theoretische Grundlagen der Kommunikationstechnikde
tub.affiliation.facultyFak. 4 Elektrotechnik und Informatikde
tub.affiliation.groupFG Theoretische Grundlagen der Kommunikationstechnikde
tub.affiliation.instituteInst. Telekommunikationssystemede
tub.publisher.universityorinstitutionTechnische Universität Berlinen

Files

Original bundle
Now showing 1 - 1 of 1
Loading…
Thumbnail Image
Name:
entropy-22-00679-v2.pdf
Size:
400.65 KB
Format:
Adobe Portable Document Format
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
4.9 KB
Format:
Item-specific license agreed upon to submission
Description:

Collections