A new scenario for generating a secret key and two private keys among three
Terminals in the presence of an external eavesdropper is considered. Terminals
1, 2 and 3 intend to share a common secret key concealed from the external
eavesdropper (Terminal 4) and simultaneously, each of Terminals 1 and 2 intends
to share a private key with Terminal 3 while keeping it concealed from each
other and from Terminal 4. All four Terminals observe i.i.d. outputs of
correlated sources and there is a public channel from Terminal 3 to Terminals 1
and 2. An inner bound of the "secret key-private keys capacity region" is
derived and the single letter capacity regions are obtained for some special
cases.Comment: 6 pages, 3 figure