Private Key and Group Key Generation Using Correlated Sources and Wiretap Broadcast Channel in Presence of One-Way Public Communication
Encryption with shared key is one of the methods to ensure secure communication. To meet the requirements of keys, this paper investigates the problem of generating private key (PK) and group key (GK) using correlated sources and discrete memoryless wiretap broadcast channel (DM-WBC), in presence of...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2019-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/8815690/ |
_version_ | 1819174240183648256 |
---|---|
author | Shixun Gong Xiaofeng Tao Na Li Haowei Wang |
author_facet | Shixun Gong Xiaofeng Tao Na Li Haowei Wang |
author_sort | Shixun Gong |
collection | DOAJ |
description | Encryption with shared key is one of the methods to ensure secure communication. To meet the requirements of keys, this paper investigates the problem of generating private key (PK) and group key (GK) using correlated sources and discrete memoryless wiretap broadcast channel (DM-WBC), in presence of one-way public communication. In the model considered, one transmitter (Alice) and three receivers (Bob, Carol and Eve) are connected via a DM-WBC, and a one-way communication over a public noiseless channel, initiated by Alice, is available. Alice and Bob wish to share a PK that is concealed from Carol and Eve, and they also want to generate a GK with Carol that needs to keep secret from Eve. Under this model, the key capacity regions of PK and GK are established by designing joint source-channel coding schemes to achieve these regions. In PK-generation, the considered model can be viewed as a one receiver two-eavesdropper model, and Alice and Bob have access to correlated source sequences. In GK-generation, the considered model can be viewed as a two-receiver one eavesdropper model, and the three legitimate parties (Alice, Bob and Carol) all have the source observations. Furthermore, the security performance of the generated keys are analyzed by analyzing key leakage rate of each key. |
first_indexed | 2024-12-22T20:35:49Z |
format | Article |
id | doaj.art-489360630efe4056a8d1198ffe106f85 |
institution | Directory Open Access Journal |
issn | 2169-3536 |
language | English |
last_indexed | 2024-12-22T20:35:49Z |
publishDate | 2019-01-01 |
publisher | IEEE |
record_format | Article |
series | IEEE Access |
spelling | doaj.art-489360630efe4056a8d1198ffe106f852022-12-21T18:13:27ZengIEEEIEEE Access2169-35362019-01-01712681212683010.1109/ACCESS.2019.29377998815690Private Key and Group Key Generation Using Correlated Sources and Wiretap Broadcast Channel in Presence of One-Way Public CommunicationShixun Gong0https://orcid.org/0000-0002-6930-1974Xiaofeng Tao1https://orcid.org/0000-0001-9518-1622Na Li2https://orcid.org/0000-0001-7966-3568Haowei Wang3National Engineering Laboratory for Mobile Network Technologies, Beijing University of Posts and Telecommunications, Beijing, ChinaNational Engineering Laboratory for Mobile Network Technologies, Beijing University of Posts and Telecommunications, Beijing, ChinaNational Engineering Laboratory for Mobile Network Technologies, Beijing University of Posts and Telecommunications, Beijing, ChinaNational Engineering Laboratory for Mobile Network Technologies, Beijing University of Posts and Telecommunications, Beijing, ChinaEncryption with shared key is one of the methods to ensure secure communication. To meet the requirements of keys, this paper investigates the problem of generating private key (PK) and group key (GK) using correlated sources and discrete memoryless wiretap broadcast channel (DM-WBC), in presence of one-way public communication. In the model considered, one transmitter (Alice) and three receivers (Bob, Carol and Eve) are connected via a DM-WBC, and a one-way communication over a public noiseless channel, initiated by Alice, is available. Alice and Bob wish to share a PK that is concealed from Carol and Eve, and they also want to generate a GK with Carol that needs to keep secret from Eve. Under this model, the key capacity regions of PK and GK are established by designing joint source-channel coding schemes to achieve these regions. In PK-generation, the considered model can be viewed as a one receiver two-eavesdropper model, and Alice and Bob have access to correlated source sequences. In GK-generation, the considered model can be viewed as a two-receiver one eavesdropper model, and the three legitimate parties (Alice, Bob and Carol) all have the source observations. Furthermore, the security performance of the generated keys are analyzed by analyzing key leakage rate of each key.https://ieeexplore.ieee.org/document/8815690/Information-theoretic securitycorrelated sourcewiretap broadcast channelprivate keygroup keykey capacity region |
spellingShingle | Shixun Gong Xiaofeng Tao Na Li Haowei Wang Private Key and Group Key Generation Using Correlated Sources and Wiretap Broadcast Channel in Presence of One-Way Public Communication IEEE Access Information-theoretic security correlated source wiretap broadcast channel private key group key key capacity region |
title | Private Key and Group Key Generation Using Correlated Sources and Wiretap Broadcast Channel in Presence of One-Way Public Communication |
title_full | Private Key and Group Key Generation Using Correlated Sources and Wiretap Broadcast Channel in Presence of One-Way Public Communication |
title_fullStr | Private Key and Group Key Generation Using Correlated Sources and Wiretap Broadcast Channel in Presence of One-Way Public Communication |
title_full_unstemmed | Private Key and Group Key Generation Using Correlated Sources and Wiretap Broadcast Channel in Presence of One-Way Public Communication |
title_short | Private Key and Group Key Generation Using Correlated Sources and Wiretap Broadcast Channel in Presence of One-Way Public Communication |
title_sort | private key and group key generation using correlated sources and wiretap broadcast channel in presence of one way public communication |
topic | Information-theoretic security correlated source wiretap broadcast channel private key group key key capacity region |
url | https://ieeexplore.ieee.org/document/8815690/ |
work_keys_str_mv | AT shixungong privatekeyandgroupkeygenerationusingcorrelatedsourcesandwiretapbroadcastchannelinpresenceofonewaypubliccommunication AT xiaofengtao privatekeyandgroupkeygenerationusingcorrelatedsourcesandwiretapbroadcastchannelinpresenceofonewaypubliccommunication AT nali privatekeyandgroupkeygenerationusingcorrelatedsourcesandwiretapbroadcastchannelinpresenceofonewaypubliccommunication AT haoweiwang privatekeyandgroupkeygenerationusingcorrelatedsourcesandwiretapbroadcastchannelinpresenceofonewaypubliccommunication |