We consider a model for secrecy generation, with three terminals, by means ofpublic interterminal communication, and examine the problem of characterizingall the rates at which all three terminals can generate a ``secret key,'' and-- simultaneously -- two designated terminals can generate a ``private key''which is effectively concealed from the remaining terminal; both keys are alsoconcealed from an eavesdropper that observes the public communication. Innerand outer bounds for the ``secret key--private key capacity region'' arederived. Under a certain special condition, these bounds coincide to yield the(exact) secret key--private key capacity region.
展开▼