|国家预印本平台
首页|Capacity Region for Covert Secret Key Generation over Multiple Access Channels

Capacity Region for Covert Secret Key Generation over Multiple Access Channels

Capacity Region for Covert Secret Key Generation over Multiple Access Channels

来源:Arxiv_logoArxiv
英文摘要

We study covert secret key generation over a binary-input two-user multiple access channel with one-way public discussion and derive bounds on the capacity region. Specifically, in this problem, there are three legitimate parties: Alice, Bob and Charlie. The goal is to allow Charlie to generate a secret key with Alice and another secret key with Bob, reliably, secretly and covertly. Reliability ensures that the key generated by Alice and Charlie is the same and the key generated by Bob and Charlie is the same. Secrecy ensures that the secret keys generated are only known to specific legitimate parties. Covertness ensures that the key generation process is undetectable by a warden Willie. As a corollary of our result, we establish bounds on the capacity region of wiretap secret key generation without the covertness constraint and discuss the impact of covertness. Our results generalize the point-to-point result of Tahmasbi and Bloch (TIFS 2020) to the setting of multiterminal communication.

Yingxin Zhang、Lin Zhou、Qiaosheng Zhang

通信无线通信

Yingxin Zhang,Lin Zhou,Qiaosheng Zhang.Capacity Region for Covert Secret Key Generation over Multiple Access Channels[EB/OL].(2025-04-08)[2025-04-25].https://arxiv.org/abs/2504.05828.点此复制

评论