Stealthy keyless secret key generation from degraded sources

To conceal the behavior of communications, we may adopt covert or stealthy communications under different scenarios and demands. However, when legitimate users have worse channels than the eavesdropper, the legitimate users may need additional keys to attain the concealment. Normal secret key generation (SKG) schemes may raise Willie's attention due to the public discussion breaking the concealment. Therefore, in this work, we investigate how to conceal the SKG itself, especially according to the stealth constraint. We prove that if the virtual channel between the common random source observed by the legitimate Alice and Bob, namely, X and Y, respectively, is more capable than that between Bob and Willie (the warden), namely, Y and Z, respectively, the same stealthy SK rate as in the case without stealth constraint can be achieved. Furthermore, if (X, Y, Z) form a Markov chain, then the key capacity of the SKG with the stealth constraint can be achieved for free.

[1]  Boulat A. Bash,et al.  Limits of Reliable Communication with Low Probability of Detection on AWGN Channels , 2012, IEEE Journal on Selected Areas in Communications.

[2]  Igal Sason,et al.  On Reverse Pinsker Inequalities , 2015, ArXiv.

[3]  Stefan M. Moser,et al.  Advanced Topics in Information Theory: Lecture Notes , 2018 .

[4]  Matthieu R. Bloch,et al.  Covert secret key generation , 2017, 2017 IEEE Conference on Communications and Network Security (CNS).

[5]  Matthieu R. Bloch,et al.  Covert Communication Over Noisy Channels: A Resolvability Perspective , 2015, IEEE Transactions on Information Theory.

[6]  Abbas El Gamal,et al.  Network Information Theory , 2021, 2021 IEEE 3rd International Conference on Advanced Trends in Information Theory (ATIT).

[7]  Eduard A. Jorswieck,et al.  Stealthy Secret Key Generation , 2017, 2017 IEEE Global Conference on Signal and Information Processing (GlobalSIP).

[8]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[9]  Mayank Bakshi,et al.  Reliable deniable communication: Hiding messages in noise , 2013, 2013 IEEE International Symposium on Information Theory.

[10]  Lizhong Zheng,et al.  Fundamental Limits of Communication With Low Probability of Detection , 2015, IEEE Transactions on Information Theory.

[11]  Matthieu R. Bloch,et al.  Physical-Layer Security: From Information Theory to Security Engineering , 2011 .

[12]  Michelle Effros,et al.  A strong converse for a collection of network source coding problems , 2009, 2009 IEEE International Symposium on Information Theory.

[13]  Gerhard Kramer,et al.  Effective secrecy: Reliability, confusion and stealth , 2013, 2014 IEEE International Symposium on Information Theory.