Simultaneously generating secret and private keys in a cooperative pairwise-independent network

Xu, Peng and Ding, Zhiguo and Dai, Xuchu and Karagiannidis, George K. (2016) Simultaneously generating secret and private keys in a cooperative pairwise-independent network. IEEE Transactions on Information Forensics and Security, 11 (6). pp. 1139-1150. ISSN 1556-6013

[thumbnail of SK_PK2]
SK_PK2.pdf - Accepted Version
Available under License Creative Commons Attribution-NonCommercial.

Download (4MB)


This paper studies the problem of simultaneously generating a secret key (SK) and a private key (PK) between Alice and Bob, in a cooperative pairwise-independent network (PIN) with two relays. In the PIN, the pairwise source observed by every pair of terminals is independent of those sources observed by any other pairs. The SK needs to be protected from Eve, while the PK needs to be protected not only from Eve but also from the two relays. Two cooperative SK-PK generation algorithms are proposed: both of them first generate common randomness, based on the well-established pairwise key generation technique and the application of the one-time pad; but then, the two algorithms utilize the XOR operation and a specific random-binning-based SK-PK codebook to generate the expected keys, respectively. The achievable SK-PK rate regions of both the two proposed algorithms are analyzed. Of particular interest is the second algorithm with random-bing based codebook, whose achievable key rate region is demonstrated to be exactly the same as the derived outer bound, a crucial step for establishing the key capacity of this PIN model. Finally, the two proposed SK-PK generation algorithms are extended to a cooperative wireless network, where the correlated source observations are obtained from estimating wireless channels during a training phase.

Item Type:
Journal Article
Journal or Publication Title:
IEEE Transactions on Information Forensics and Security
Additional Information:
©2016 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.
Uncontrolled Keywords:
?? cooperative pin modelinformation-theoretic securitykey capacity regionprivate keysecret keycomputer networks and communicationssafety, risk, reliability and quality ??
ID Code:
Deposited By:
Deposited On:
10 Aug 2016 09:04
Last Modified:
18 Dec 2023 01:37