Stealthy keyless secret key generation from degraded sources

Pin Hsun Lin, Carsten R. Janda, Eduard A. Jorswieck, Rafael F. Schaefer

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

3 Scopus citations

Abstract

To conceal the behavior of communications, we may adopt covert or stealthy communications under different scenarios and demands. However, when legitimate users have worse channels than the eavesdropper, the legitimate users may need additional keys to attain the concealment. Normal secret key generation (SKG) schemes may raise Willie's attention due to the public discussion breaking the concealment. Therefore, in this work, we investigate how to conceal the SKG itself, especially according to the stealth constraint. We prove that if the virtual channel between the common random source observed by the legitimate Alice and Bob, namely, X and Y, respectively, is more capable than that between Bob and Willie (the warden), namely, Y and Z, respectively, the same stealthy SK rate as in the case without stealth constraint can be achieved. Furthermore, if (X, Y, Z) form a Markov chain, then the key capacity of the SKG with the stealth constraint can be achieved for free.

Original languageEnglish
Title of host publicationConference Record of 51st Asilomar Conference on Signals, Systems and Computers, ACSSC 2017
EditorsMichael B. Matthews
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages14-18
Number of pages5
ISBN (Electronic)9781538618233
DOIs
StatePublished - 2 Jul 2017
Externally publishedYes
Event51st Asilomar Conference on Signals, Systems and Computers, ACSSC 2017 - Pacific Grove, United States
Duration: 29 Oct 20171 Nov 2017

Publication series

NameConference Record of 51st Asilomar Conference on Signals, Systems and Computers, ACSSC 2017
Volume2017-October

Conference

Conference51st Asilomar Conference on Signals, Systems and Computers, ACSSC 2017
Country/TerritoryUnited States
CityPacific Grove
Period29/10/171/11/17

Fingerprint

Dive into the research topics of 'Stealthy keyless secret key generation from degraded sources'. Together they form a unique fingerprint.

Cite this