Secrecy capacities for multiple terminals

被引:285
作者
Csiszár, I
Narayan, P
机构
[1] Hungarian Acad Sci, A Renyi Inst Math, H-1364 Budapest, Hungary
[2] Univ Maryland, Dept Elect & Comp Engn, College Pk, MD 20742 USA
[3] Univ Maryland, Syst Res Inst, College Pk, MD 20742 USA
基金
美国国家科学基金会;
关键词
common randomness; multiple source; private key; public discussion; secrecy capacity; security index; Slepian-Wolf constraints; wiretap;
D O I
10.1109/TIT.2004.838380
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We derive single-letter characterizations of (strong) secrecy capacities for models with an arbitrary number of terminals, each of which observes a distinct component of a discrete memoryless multiple source, with unrestricted and interactive public communication permitted between the terminals. A subset of these terminals can serve as helpers for the remaining terminals in generating secrecy. According to the extent of an eavesdropper's knowledge, three kinds of secrecy capacity are considered: secret key (SK), private key (PK), and wiretap secret key (WSK) capacity. The characterizations of the SK and PK capacities highlight the innate connections between secrecy generation and multiterminal source coding without secrecy requirements. A general upper bound for WSK capacity is derived which is tight in the case when the eavesdropper can wiretap noisy versions of the components of the underlying multiple source, provided randomization is permitted at the terminals. These secrecy capacities are seen to be achievable with noninteractive communication between the terminals. The achievability results are also shown to be universal.
引用
收藏
页码:3047 / 3061
页数:15
相关论文
共 14 条
[1]   Common randomness in information theory and cryptography - Part II: CR capacity [J].
Ahlswede, R ;
Csiszar, I .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1998, 44 (01) :225-240
[2]   COMMON RANDOMNESS IN INFORMATION-THEORY AND CRYPTOGRAPHY .1. SECRET SHARING [J].
AHLSWEDE, R ;
CSISZAR, I .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1993, 39 (04) :1121-1132
[3]  
[Anonymous], 1996, PROBLEMY PEREDACHI I
[4]   PROOF OF DATA COMPRESSION THEOREM OF SLEPIAN AND WOLF FOR ERGODIC SOURCES [J].
COVER, TM .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1975, 21 (02) :226-228
[5]   Common randomness and secret key generation with a helper [J].
Csiszár, I ;
Narayan, P .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2000, 46 (02) :344-366
[6]  
CSISZAR I, 1982, INFORMATION THEORY C
[7]  
Georgii H.-O., 1988, Gibbs Measures and Phase Transitions
[8]  
Maurer U, 1997, LECT NOTES COMPUT SC, V1294, P307
[9]  
MAURER UM, 1993, IEEE T INFORM THEORY, V39, P733, DOI 10.1109/18.256484
[10]  
MAURER UM, 1994, KLUW COMMUN, V276, P271