首页> 外文会议>Asilomar Conference on Signals, Systems and Computers >Stealthy keyless secret key generation from degraded sources
【24h】

Stealthy keyless secret key generation from degraded sources

机译:从降级来源隐秘地生成无密钥秘密密钥

获取原文

摘要

To conceal the behavior of communications, we may adopt covert or stealthy communications under different scenarios and demands. However, when legitimate users have worse channels than the eavesdropper, the legitimate users may need additional keys to attain the concealment. Normal secret key generation (SKG) schemes may raise Willie's attention due to the public discussion breaking the concealment. Therefore, in this work, we investigate how to conceal the SKG itself, especially according to the stealth constraint. We prove that if the virtual channel between the common random source observed by the legitimate Alice and Bob, namely, X and Y, respectively, is more capable than that between Bob and Willie (the warden), namely, Y and Z, respectively, the same stealthy SK rate as in the case without stealth constraint can be achieved. Furthermore, if (X, Y, Z) form a Markov chain, then the key capacity of the SKG with the stealth constraint can be achieved for free.
机译:为了掩盖通信的行为,我们可能会在不同的情况和需求下采用隐蔽或隐秘通信。但是,当合法用户的通道比窃听者的通道差时,合法用户可能需要其他密钥来获得隐藏。由于公开讨论打破了隐瞒,普通的秘密密钥生成(SKG)方案可能会引起Willie的注意。因此,在这项工作中,我们研究了如何隐藏SKG本身,尤其是根据隐身约束。我们证明,如果合法Alice和Bob观察到的公共随机源之间的虚拟通道(分别为X和Y)比Bob和Willie(监护人)之间的虚拟通道(分别为Y和Z)更有效,可以实现与没有隐身约束的情况相同的隐身SK率。此外,如果(X,Y,Z)形成马尔可夫链,则可以免费获得具有隐身约束的SKG的密钥容量。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号