• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

隐秘密钥生成

Stealthy Secret Key Generation.

作者信息

Lin Pin-Hsun, Janda Carsten R, Jorswieck Eduard A, Schaefer Rafael F

机构信息

Information Theory and Communication Systems Department, Technische Universität Braunschweig, 38106 Braunschweig, Germany.

Information Theory and Applications Chair, Technische Universität Berlin, 10623 Berlin, Germany.

出版信息

Entropy (Basel). 2020 Jun 18;22(6):679. doi: 10.3390/e22060679.

DOI:10.3390/e22060679
PMID:33286452
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC7517219/
Abstract

In order to make a warden, Willie, unaware of the existence of meaningful communications, there have been different schemes proposed including covert and stealth communications. When legitimate users have no channel advantage over Willie, the legitimate users may need additional secret keys to confuse Willie, if the stealth or covert communication is still possible. However, secret key generation (SKG) may raise Willie's attention since it has a public discussion, which is observable by Willie. To prevent Willie's attention, we consider the source model for SKG under a strong secrecy constraint, which has further to fulfill a stealth constraint. Our first contribution is that, if the stochastic dependence between the observations at Alice and Bob fulfills the strict more capable criterion with respect to the stochastic dependence between the observations at Alice and Willie or between Bob and Willie, then a positive stealthy secret key rate is identical to the one without the stealth constraint. Our second contribution is that, if the random variables observed at Alice, Bob, and Willie induced by the common random source form a Markov chain, then the key capacity of the source model SKG with the strong secrecy constraint and the stealth constraint is equal to the key capacity with the strong secrecy constraint, but without the stealth constraint. For the case of fast fading models, a sufficient condition for the existence of an equivalent model, which is degraded, is provided, based on stochastic orders. Furthermore, we present an example to illustrate our results.

摘要

为了使典狱长威利 unaware 有意义通信的存在,人们提出了不同的方案,包括隐蔽和秘密通信。当合法用户相对于威利没有信道优势时,如果仍然可能进行秘密或隐蔽通信,合法用户可能需要额外的密钥来迷惑威利。然而,密钥生成(SKG)可能会引起威利的注意,因为它有一个公开讨论,这是威利可以观察到的。为了防止威利的注意,我们考虑在强保密性约束下的 SKG 源模型,该模型还需要满足一个秘密约束。我们的第一个贡献是,如果爱丽丝和鲍勃观测值之间的随机依赖性相对于爱丽丝和威利或鲍勃和威利观测值之间的随机依赖性满足严格的更有能力标准,那么正的秘密密钥率与没有秘密约束时的相同。我们的第二个贡献是,如果由公共随机源在爱丽丝、鲍勃和威利处观测到的随机变量形成一个马尔可夫链,那么具有强保密性约束和秘密约束的源模型 SKG 的密钥容量等于具有强保密性约束但没有秘密约束的密钥容量。对于快衰落模型的情况,基于随机序提供了一个退化的等效模型存在的充分条件。此外,我们给出一个例子来说明我们的结果。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6bb3/7517219/1ed6a4fd98eb/entropy-22-00679-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6bb3/7517219/e8abe7246e89/entropy-22-00679-g0A1.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6bb3/7517219/1ed6a4fd98eb/entropy-22-00679-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6bb3/7517219/e8abe7246e89/entropy-22-00679-g0A1.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6bb3/7517219/1ed6a4fd98eb/entropy-22-00679-g001.jpg

相似文献

1
Stealthy Secret Key Generation.隐秘密钥生成
Entropy (Basel). 2020 Jun 18;22(6):679. doi: 10.3390/e22060679.
2
Free-space optical wiretap channel and experimental secret key agreement in 7.8 km terrestrial link.7.8公里地面链路中的自由空间光窃听信道与实验性密钥协商
Opt Express. 2018 Jul 23;26(15):19513-19523. doi: 10.1364/OE.26.019513.
3
Secrecy Capacity Region of the AWGN MAC with External Eavesdropper and Feedback.具有外部窃听者和反馈的加性高斯白噪声多址接入信道的保密容量区域
Entropy (Basel). 2023 Sep 15;25(9):1339. doi: 10.3390/e25091339.
4
On the Zero-Outage Secrecy-Capacity of Dependent Fading Wiretap Channels.关于相关衰落窃听信道的零中断保密容量
Entropy (Basel). 2022 Jan 8;24(1):99. doi: 10.3390/e24010099.
5
Protecting Physical Layer Secret Key Generation from Active Attacks.保护物理层密钥生成免受主动攻击。
Entropy (Basel). 2021 Jul 27;23(8):960. doi: 10.3390/e23080960.
6
Parameter Estimation with Almost No Public Communication for Continuous-Variable Quantum Key Distribution.参数估计几乎没有公开的连续变量量子密钥分发的沟通。
Phys Rev Lett. 2018 Jun 1;120(22):220505. doi: 10.1103/PhysRevLett.120.220505.
7
Gaussian Multiuser Wiretap Channels in the Presence of a Jammer-Aided Eavesdropper.存在干扰辅助窃听者情况下的高斯多用户窃听信道
Entropy (Basel). 2022 Nov 2;24(11):1595. doi: 10.3390/e24111595.
8
A Simple Secret Key Generation by Using a Combination of Pre-Processing Method with a Multilevel Quantization.一种通过预处理方法与多级量化相结合生成简单密钥的方法。
Entropy (Basel). 2019 Feb 18;21(2):192. doi: 10.3390/e21020192.
9
Feedback Schemes for the Action-Dependent Wiretap Channel with Noncausal State at the Transmitter.发射端具有非因果状态信息的依赖行动窃听信道的反馈方案
Entropy (Basel). 2019 Mar 13;21(3):278. doi: 10.3390/e21030278.
10
Amplitude Constrained Vector Gaussian Wiretap Channel: Properties of the Secrecy-Capacity-Achieving Input Distribution.幅度受限向量高斯窃听信道:保密容量可达输入分布的性质
Entropy (Basel). 2023 Apr 30;25(5):741. doi: 10.3390/e25050741.

引用本文的文献

1
Cooperative Jamming-Based Physical-Layer Group Secret and Private Key Generation.基于协作干扰的物理层群组秘密与私钥生成
Entropy (Basel). 2024 Sep 4;26(9):758. doi: 10.3390/e26090758.
2
Variable-Length Resolvability for General Sources and Channels.一般信源与信道的变长可解性
Entropy (Basel). 2023 Oct 19;25(10):1466. doi: 10.3390/e25101466.