Private Key and Group Key Generation Using Correlated Sources and Wiretap Broadcast Channel in Presence of One-Way Public Communication

Encryption with shared key is one of the methods to ensure secure communication. To meet the requirements of keys, this paper investigates the problem of generating private key (PK) and group key (GK) using correlated sources and discrete memoryless wiretap broadcast channel (DM-WBC), in presence of...

Full description

Bibliographic Details
Main Authors: Shixun Gong, Xiaofeng Tao, Na Li, Haowei Wang
Format: Article
Language:English
Published: IEEE 2019-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/8815690/
_version_ 1819174240183648256
author Shixun Gong
Xiaofeng Tao
Na Li
Haowei Wang
author_facet Shixun Gong
Xiaofeng Tao
Na Li
Haowei Wang
author_sort Shixun Gong
collection DOAJ
description Encryption with shared key is one of the methods to ensure secure communication. To meet the requirements of keys, this paper investigates the problem of generating private key (PK) and group key (GK) using correlated sources and discrete memoryless wiretap broadcast channel (DM-WBC), in presence of one-way public communication. In the model considered, one transmitter (Alice) and three receivers (Bob, Carol and Eve) are connected via a DM-WBC, and a one-way communication over a public noiseless channel, initiated by Alice, is available. Alice and Bob wish to share a PK that is concealed from Carol and Eve, and they also want to generate a GK with Carol that needs to keep secret from Eve. Under this model, the key capacity regions of PK and GK are established by designing joint source-channel coding schemes to achieve these regions. In PK-generation, the considered model can be viewed as a one receiver two-eavesdropper model, and Alice and Bob have access to correlated source sequences. In GK-generation, the considered model can be viewed as a two-receiver one eavesdropper model, and the three legitimate parties (Alice, Bob and Carol) all have the source observations. Furthermore, the security performance of the generated keys are analyzed by analyzing key leakage rate of each key.
first_indexed 2024-12-22T20:35:49Z
format Article
id doaj.art-489360630efe4056a8d1198ffe106f85
institution Directory Open Access Journal
issn 2169-3536
language English
last_indexed 2024-12-22T20:35:49Z
publishDate 2019-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj.art-489360630efe4056a8d1198ffe106f852022-12-21T18:13:27ZengIEEEIEEE Access2169-35362019-01-01712681212683010.1109/ACCESS.2019.29377998815690Private Key and Group Key Generation Using Correlated Sources and Wiretap Broadcast Channel in Presence of One-Way Public CommunicationShixun Gong0https://orcid.org/0000-0002-6930-1974Xiaofeng Tao1https://orcid.org/0000-0001-9518-1622Na Li2https://orcid.org/0000-0001-7966-3568Haowei Wang3National Engineering Laboratory for Mobile Network Technologies, Beijing University of Posts and Telecommunications, Beijing, ChinaNational Engineering Laboratory for Mobile Network Technologies, Beijing University of Posts and Telecommunications, Beijing, ChinaNational Engineering Laboratory for Mobile Network Technologies, Beijing University of Posts and Telecommunications, Beijing, ChinaNational Engineering Laboratory for Mobile Network Technologies, Beijing University of Posts and Telecommunications, Beijing, ChinaEncryption with shared key is one of the methods to ensure secure communication. To meet the requirements of keys, this paper investigates the problem of generating private key (PK) and group key (GK) using correlated sources and discrete memoryless wiretap broadcast channel (DM-WBC), in presence of one-way public communication. In the model considered, one transmitter (Alice) and three receivers (Bob, Carol and Eve) are connected via a DM-WBC, and a one-way communication over a public noiseless channel, initiated by Alice, is available. Alice and Bob wish to share a PK that is concealed from Carol and Eve, and they also want to generate a GK with Carol that needs to keep secret from Eve. Under this model, the key capacity regions of PK and GK are established by designing joint source-channel coding schemes to achieve these regions. In PK-generation, the considered model can be viewed as a one receiver two-eavesdropper model, and Alice and Bob have access to correlated source sequences. In GK-generation, the considered model can be viewed as a two-receiver one eavesdropper model, and the three legitimate parties (Alice, Bob and Carol) all have the source observations. Furthermore, the security performance of the generated keys are analyzed by analyzing key leakage rate of each key.https://ieeexplore.ieee.org/document/8815690/Information-theoretic securitycorrelated sourcewiretap broadcast channelprivate keygroup keykey capacity region
spellingShingle Shixun Gong
Xiaofeng Tao
Na Li
Haowei Wang
Private Key and Group Key Generation Using Correlated Sources and Wiretap Broadcast Channel in Presence of One-Way Public Communication
IEEE Access
Information-theoretic security
correlated source
wiretap broadcast channel
private key
group key
key capacity region
title Private Key and Group Key Generation Using Correlated Sources and Wiretap Broadcast Channel in Presence of One-Way Public Communication
title_full Private Key and Group Key Generation Using Correlated Sources and Wiretap Broadcast Channel in Presence of One-Way Public Communication
title_fullStr Private Key and Group Key Generation Using Correlated Sources and Wiretap Broadcast Channel in Presence of One-Way Public Communication
title_full_unstemmed Private Key and Group Key Generation Using Correlated Sources and Wiretap Broadcast Channel in Presence of One-Way Public Communication
title_short Private Key and Group Key Generation Using Correlated Sources and Wiretap Broadcast Channel in Presence of One-Way Public Communication
title_sort private key and group key generation using correlated sources and wiretap broadcast channel in presence of one way public communication
topic Information-theoretic security
correlated source
wiretap broadcast channel
private key
group key
key capacity region
url https://ieeexplore.ieee.org/document/8815690/
work_keys_str_mv AT shixungong privatekeyandgroupkeygenerationusingcorrelatedsourcesandwiretapbroadcastchannelinpresenceofonewaypubliccommunication
AT xiaofengtao privatekeyandgroupkeygenerationusingcorrelatedsourcesandwiretapbroadcastchannelinpresenceofonewaypubliccommunication
AT nali privatekeyandgroupkeygenerationusingcorrelatedsourcesandwiretapbroadcastchannelinpresenceofonewaypubliccommunication
AT haoweiwang privatekeyandgroupkeygenerationusingcorrelatedsourcesandwiretapbroadcastchannelinpresenceofonewaypubliccommunication