Skip to main content
Article thumbnail
Location of Repository

A New Secret key Agreement Scheme in a Four-Terminal Network

By Parisa Babaheidarian, Somayeh Salimi and Mohammad Reza Aref

Abstract

A new scenario for generating a secret key and two private keys among three Terminals in the presence of an external eavesdropper is considered. Terminals 1, 2 and 3 intend to share a common secret key concealed from the external eavesdropper (Terminal 4) and simultaneously, each of Terminals 1 and 2 intends to share a private key with Terminal 3 while keeping it concealed from each other and from Terminal 4. All four Terminals observe i.i.d. outputs of correlated sources and there is a public channel from Terminal 3 to Terminals 1 and 2. An inner bound of the "secret key-private keys capacity region" is derived and the single letter capacity regions are obtained for some special cases.Comment: 6 pages, 3 figure

Topics: Computer Science - Cryptography and Security, Computer Science - Information Theory
Year: 2011
OAI identifier: oai:arXiv.org:1103.5197
Download PDF:
Sorry, we are unable to provide the full text but you may find it at the following location(s):
  • http://arxiv.org/abs/1103.5197 (external link)
  • Suggested articles


    To submit an update or takedown request for this paper, please submit an Update/Correction/Removal Request.