The secret key capacity for multiple terminals

I. Csiszár, Prakash Narayan

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

We consider the problem of characterizing the secret key (SK)-capacity [Maurer 1993, Ahlswede-Csiszar 1993, Csiszar-Narayan 2000] for an arbitrary number of terminals, each of which observes a distinct component of a discrete memoryless multiple source, with unconstrained public communication allowed between these terminals. Our main contribution is the determination of SK-capacity for an arbitrary subset of terminals with the remaining terminals serving as "helpers," when an eavesdropper observes the communication between the terminals but does not have access to any other information. We also determine the private key (PK)-capacity when the eavesdropper additionally wiretaps some of the helper terminals from which too the key must then be concealed.

Original languageEnglish
Title of host publicationIEEE International Symposium on Information Theory - Proceedings
Pages27
Number of pages1
Publication statusPublished - 2002
Event2002 IEEE International Symposium on Information Theory - Lausanne, Switzerland
Duration: Jun 30 2002Jul 5 2002

Other

Other2002 IEEE International Symposium on Information Theory
CountrySwitzerland
CityLausanne
Period6/30/027/5/02

Fingerprint

Communication

ASJC Scopus subject areas

  • Electrical and Electronic Engineering

Cite this

Csiszár, I., & Narayan, P. (2002). The secret key capacity for multiple terminals. In IEEE International Symposium on Information Theory - Proceedings (pp. 27)

The secret key capacity for multiple terminals. / Csiszár, I.; Narayan, Prakash.

IEEE International Symposium on Information Theory - Proceedings. 2002. p. 27.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Csiszár, I & Narayan, P 2002, The secret key capacity for multiple terminals. in IEEE International Symposium on Information Theory - Proceedings. pp. 27, 2002 IEEE International Symposium on Information Theory, Lausanne, Switzerland, 6/30/02.
Csiszár I, Narayan P. The secret key capacity for multiple terminals. In IEEE International Symposium on Information Theory - Proceedings. 2002. p. 27
Csiszár, I. ; Narayan, Prakash. / The secret key capacity for multiple terminals. IEEE International Symposium on Information Theory - Proceedings. 2002. pp. 27
@inproceedings{de55de6978bd4cd39ebb0d22d5eba8f8,
title = "The secret key capacity for multiple terminals",
abstract = "We consider the problem of characterizing the secret key (SK)-capacity [Maurer 1993, Ahlswede-Csiszar 1993, Csiszar-Narayan 2000] for an arbitrary number of terminals, each of which observes a distinct component of a discrete memoryless multiple source, with unconstrained public communication allowed between these terminals. Our main contribution is the determination of SK-capacity for an arbitrary subset of terminals with the remaining terminals serving as {"}helpers,{"} when an eavesdropper observes the communication between the terminals but does not have access to any other information. We also determine the private key (PK)-capacity when the eavesdropper additionally wiretaps some of the helper terminals from which too the key must then be concealed.",
author = "I. Csisz{\'a}r and Prakash Narayan",
year = "2002",
language = "English",
pages = "27",
booktitle = "IEEE International Symposium on Information Theory - Proceedings",

}

TY - GEN

T1 - The secret key capacity for multiple terminals

AU - Csiszár, I.

AU - Narayan, Prakash

PY - 2002

Y1 - 2002

N2 - We consider the problem of characterizing the secret key (SK)-capacity [Maurer 1993, Ahlswede-Csiszar 1993, Csiszar-Narayan 2000] for an arbitrary number of terminals, each of which observes a distinct component of a discrete memoryless multiple source, with unconstrained public communication allowed between these terminals. Our main contribution is the determination of SK-capacity for an arbitrary subset of terminals with the remaining terminals serving as "helpers," when an eavesdropper observes the communication between the terminals but does not have access to any other information. We also determine the private key (PK)-capacity when the eavesdropper additionally wiretaps some of the helper terminals from which too the key must then be concealed.

AB - We consider the problem of characterizing the secret key (SK)-capacity [Maurer 1993, Ahlswede-Csiszar 1993, Csiszar-Narayan 2000] for an arbitrary number of terminals, each of which observes a distinct component of a discrete memoryless multiple source, with unconstrained public communication allowed between these terminals. Our main contribution is the determination of SK-capacity for an arbitrary subset of terminals with the remaining terminals serving as "helpers," when an eavesdropper observes the communication between the terminals but does not have access to any other information. We also determine the private key (PK)-capacity when the eavesdropper additionally wiretaps some of the helper terminals from which too the key must then be concealed.

UR - http://www.scopus.com/inward/record.url?scp=0036350881&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=0036350881&partnerID=8YFLogxK

M3 - Conference contribution

AN - SCOPUS:0036350881

SP - 27

BT - IEEE International Symposium on Information Theory - Proceedings

ER -