Key Generation Algorithms for Pairwise Independent Networks Based on Graphical Models

We consider two secret key generation problems under a pairwise independent network model, and propose low complexity key generation schemes in a framework that connects our problems to network flow problems in graphs. Our schemes have two components: 1) local key generation and 2) global key propagation. In the local key generation, we use point-to-point source coding with side information to establish pairwise keys, from which we construct a graph with the capacity of each edge being the key rate of the corresponding point-to-point local key. In the global key propagation, depending on the particular problem, secret keys are delivered to users in the network using various network flow algorithms. In particular, in the first problem in which one is required to generate a group key for a group of users in the network, we propose a network coding-based global key propagation approach. This approach has a low complexity and has a better performance than the existing approach. In the second problem, in which one is required to generate multiple keys simultaneously for different pairs of users, we propose a multicommodity flow-based global key propagation approach. We show that the proposed approach is optimal for the case of generating two keys. For the general case of generating more than two keys, we show that the sum rate of the proposed scheme is larger than an upper bound characterized in this paper divided by a constant.

[1]  Baochun Li,et al.  Network Coding : The Case of Multiple Unicast Sessions , 2004 .

[2]  Ravindra K. Ahuja,et al.  Network Flows , 2011 .

[3]  Wade Trappe,et al.  Radio-telepathy: extracting a secret key from an unauthenticated wireless channel , 2008, MobiCom '08.

[4]  Rudolf Ahlswede,et al.  Network information flow , 2000, IEEE Trans. Inf. Theory.

[5]  U. Maurer,et al.  Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.

[6]  Rudolf Ahlswede,et al.  Common randomness in information theory and cryptography - I: Secret sharing , 1993, IEEE Trans. Inf. Theory.

[7]  Alexander Barg,et al.  Secret Key Generation for a Pairwise Independent Network Model , 2008, IEEE Transactions on Information Theory.

[8]  Imre Csiszár,et al.  Secrecy capacities for multiple terminals , 2004, IEEE Transactions on Information Theory.

[9]  Wade Trappe,et al.  Information-Theoretically Secret Key Generation for Fading Wireless Channels , 2009, IEEE Transactions on Information Forensics and Security.

[10]  Oktay Günlük,et al.  The multicast packing problem , 2000, TNET.

[11]  H. Vincent Poor,et al.  A Unified Framework for Key Agreement Over Wireless Fading Channels , 2009, IEEE Transactions on Information Forensics and Security.

[12]  Zixiang Xiong,et al.  On code design for the Slepian-Wolf problem and lossless multiterminal networks , 2006, IEEE Transactions on Information Theory.

[13]  Lifeng Lai,et al.  Simultaneously generating multiple keys and multi-commodity flow in networks , 2012, 2012 IEEE Information Theory Workshop.

[14]  Stark C. Draper,et al.  Impact of channel sparsity and correlated eavesdropping on secret key generation from multipath channel randomness , 2010, 2010 IEEE International Symposium on Information Theory.

[15]  Christina Fragouli,et al.  Group secret key generation over broadcast erasure channels , 2010, 2010 Conference Record of the Forty Fourth Asilomar Conference on Signals, Systems and Computers.

[16]  Chung Chan,et al.  Mutual dependence for secret key agreement , 2010, 2010 44th Annual Conference on Information Sciences and Systems (CISS).

[17]  Shyamkishor Kumar NETWORK CODING THE CASE OF MULTIPLE UNICAST SESSIONS , 2015 .

[18]  T. C. Hu Multi-Commodity Network Flows , 1963 .

[19]  Mihalis Yannakakis,et al.  Approximate Max-Flow Min-(Multi)Cut Theorems and Their Applications , 1996, SIAM J. Comput..

[20]  Ashish Khisti Interactive secret key generation over reciprocal fading channels , 2012, 2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[21]  Zongpeng Li,et al.  A Constant Bound on Throughput Improvement of Multicast Network Coding in Undirected Networks , 2009, IEEE Transactions on Information Theory.

[22]  David Tse,et al.  Channel Identification: Secret Sharing Using Reciprocity in Ultrawideband Channels , 2007, IEEE Transactions on Information Forensics and Security.

[23]  Alex Reznik,et al.  Group Secret Key Generation Algorithms , 2007, 2007 IEEE International Symposium on Information Theory.

[24]  Prakash Narayan,et al.  Secret Key and Private Key Constructions for Simple Multiterminal Source Models , 2005, IEEE Transactions on Information Theory.

[25]  Zongpeng Li,et al.  On achieving maximum multicast throughput in undirected networks , 2006, IEEE Transactions on Information Theory.