### Abstract

We consider the problem of characterizing the secret key (SK)-capacity (1,2,3)for an arbitrary number of terminals, each of which observes a distinct component of a discrete memoryless multiple source, with unconstrained public communication allowed between these terminals. Our main contribution is the determination of SK-capacity for an arbitrary subset of terminals with the remaining terminals serving as helpers, when an eavesdropper observes the communication between the terminals but does not have access to any other information. We also determine the private key (PK)-capacity when the eavesdropper additionally wiretaps some of the helper terminals from which too the key must then be concealed.

Original language | English |
---|---|

Title of host publication | Proceedings of the 2002 IEEE Information Theory Workshop, ITW 2002 |

Publisher | Institute of Electrical and Electronics Engineers Inc. |

Pages | 8-10 |

Number of pages | 3 |

ISBN (Electronic) | 0780376293, 9780780376298 |

DOIs | |

Publication status | Published - Jan 1 2002 |

Event | 2002 IEEE Information Theory Workshop, ITW 2002 - Bangalore, India Duration: Oct 20 2002 → Oct 25 2002 |

### Publication series

Name | Proceedings of the 2002 IEEE Information Theory Workshop, ITW 2002 |
---|

### Other

Other | 2002 IEEE Information Theory Workshop, ITW 2002 |
---|---|

Country | India |

City | Bangalore |

Period | 10/20/02 → 10/25/02 |

### Fingerprint

### ASJC Scopus subject areas

- Information Systems
- Electrical and Electronic Engineering
- Computer Networks and Communications
- Computational Theory and Mathematics

### Cite this

*Proceedings of the 2002 IEEE Information Theory Workshop, ITW 2002*(pp. 8-10). [1115401] (Proceedings of the 2002 IEEE Information Theory Workshop, ITW 2002). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/ITW.2002.1115401