Secret key generation for pairwise independent networks with curious helpers

We consider the problem of group secret key generation through a multi-hop network modeled by a pair-wise independent network and propose a low complexity scheme which can guarantee strong secrecy. We assume that the legitimate transmitter only has the knowledge of the maximum number of precoded keys known to any helpers, where the precoded keys are the output of a precoder at the transmitter to be propagated through the network. We also assume that nodes in the multi-hop network are curious, i.e., they not only help to relay but may eavesdrop. Confidentiality is required against an eavesdropper outside of the multi-hop network and also against the helpers in the multi-hop network, while both the curious helpers and the external eavesdropper can access a finite rate public channel between the legitimate transmitter-receiver pair. The objective is to generate secret keys shared by a given pair of nodes outside of the multi-hop network at the largest possible rate, with the cooperation of the nodes within the multi-hop network. We propose a low complexity linear transformation-based global key propagation approach to combat curious helpers by the number theoretic transform, under two scenarios: with an additional public or private channel between the pair of nodes aiming to share keys. We analyze the achievable secret key rate and investigate the performances under different network setting by numerical examples.

[1]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[2]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[3]  Suhas N. Diggavi,et al.  Creating secrets out of erasures , 2013, MobiCom.

[4]  Himanshu Tyagi,et al.  Multiterminal Secrecy by Public Discussion , 2016, Found. Trends Commun. Inf. Theory.

[5]  Hai Jiang,et al.  Optimal Relay Selection for Secure Cooperative Communications With an Adaptive Eavesdropper , 2017, IEEE Transactions on Wireless Communications.

[6]  Ueli Maurer,et al.  Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.

[7]  George K. Karagiannidis,et al.  On the Private Key Capacity of the $M$ -Relay Pairwise Independent Network , 2016, IEEE Transactions on Information Theory.

[8]  George K. Karagiannidis,et al.  Simultaneously Generating Secret and Private Keys in a Cooperative Pairwise-Independent Network , 2016, IEEE Transactions on Information Forensics and Security.

[9]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[10]  Rudolf Ahlswede,et al.  Common randomness in information theory and cryptography - I: Secret sharing , 1993, IEEE Trans. Inf. Theory.

[11]  I. Csiszár,et al.  Common randomness and secret key generation with a helper , 1997, Proceedings of the 1999 IEEE Information Theory and Communications Workshop (Cat. No. 99EX253).

[12]  Alexander Barg,et al.  Secret Key Generation for a Pairwise Independent Network Model , 2008, IEEE Transactions on Information Theory.

[13]  Imre Csiszár,et al.  Secrecy capacities for multiple terminals , 2004, IEEE Transactions on Information Theory.

[14]  Shuo-Yen Robert Li,et al.  Network Coding Theory - Part I: Single Source , 2005, Found. Trends Commun. Inf. Theory.

[15]  Lifeng Lai,et al.  Key Generation Algorithms for Pairwise Independent Networks Based on Graphical Models , 2015, IEEE Transactions on Information Theory.

[16]  Matthieu R. Bloch,et al.  Physical-Layer Security: From Information Theory to Security Engineering , 2011 .

[17]  U. Maurer,et al.  Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.