Secure Communication using an Untrusted Relay via Sources and Channels

Confidential communication aided by a relay without security clearance is studied. General strategies and outer bounds are derived for the problem of secret communication and secret key generation when correlated observations at all terminals are available. In a variation of the problem, it is assumed that the quality of the channel to the relay is known only to the relay. If the throughput-maximizing strategy is used according to the relay's claimed channel quality, the question is: what should the relay claim about the channel in order to maximize its eavesdropping capabilities? We propose a strategy that Alice and Bob may agree on in order to suppress any leakage of confidential communication between the source and the receiver.


Published in:
2009 Ieee International Symposium On Information Theory, Vols 1- 4, 2457-2461
Presented at:
IEEE International Symposium on Information Theory (ISIT 2009), Seoul, SOUTH KOREA, Jun 28-Jul 03, 2009
Year:
2009
Publisher:
Ieee Service Center, 445 Hoes Lane, Po Box 1331, Piscataway, Nj 08855-1331 Usa
ISBN:
978-1-4244-4312-3
Keywords:
Laboratories:




 Record created 2011-10-17, last modified 2018-03-17


Rate this document:

Rate this document:
1
2
3
 
(Not yet reviewed)