Helper-assisted asymmetric two key generation

The problem of simultaneously generating an asymmetric key pair with assistance of a helper is studied. In this setting, each of four terminals, i.e., a base station X<sub>0</sub>, two cellular nodes X<sub>1</sub> and X<sub>2</sub>, and a helper X<sub>3</sub>, observes a component of correlated sources. The cellular nodes X<sub>1</sub> and X<sub>2</sub> wish to generate secret keys K<sub>1</sub> and K<sub>2</sub> with the base station X<sub>0</sub>, respectively, under the help of terminal X<sub>3</sub>. Both keys should be concealed from an eavesdropper that has access to the public discussion, while K<sub>2</sub> is also required to be concealed from terminal X<sub>1</sub>. An outer bound on the key capacity region is derived. It is shown to be achievable under certain condition, and hence the key capacity region is characterized under such condition.

[1]  Chunxuan Ye,et al.  Information Theoretic Generation of Multiple Secret Keys , 2005 .

[2]  Ueli Maurer,et al.  Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.

[3]  Hua Wang,et al.  The Capacity Region of the Source-Type Model for Secret Key and Private Key Generation , 2014, IEEE Transactions on Information Theory.

[4]  Hua Wang,et al.  Secret key-private key generation over three terminals: Capacity region , 2014, 2014 IEEE International Symposium on Information Theory.

[5]  Rudolf Ahlswede,et al.  Common Randomness in Information Theory and Cryptography - Part II: CR Capacity , 1998, IEEE Trans. Inf. Theory.

[6]  Imre Csiszár,et al.  Secrecy capacities for multiple terminals , 2004, IEEE Transactions on Information Theory.

[7]  Prakash Narayan,et al.  The secret key~private key capacity region for three terminals , 2005, Proceedings. International Symposium on Information Theory, 2005. ISIT 2005..

[8]  Chung Chan,et al.  Mutual dependence for secret key agreement , 2010, 2010 44th Annual Conference on Information Sciences and Systems (CISS).

[9]  R. A. McDonald,et al.  Noiseless Coding of Correlated Information Sources , 1973 .

[10]  Rudolf Ahlswede,et al.  Common randomness in information theory and cryptography - I: Secret sharing , 1993, IEEE Trans. Inf. Theory.

[11]  I. Csiszár,et al.  Common randomness and secret key generation with a helper , 1997, Proceedings of the 1999 IEEE Information Theory and Communications Workshop (Cat. No. 99EX253).

[12]  Yingbin Liang,et al.  Key capacity region for a cellular source model , 2014, 2014 IEEE Information Theory Workshop (ITW 2014).