2020
DOI: 10.1109/tifs.2019.2932906
|View full text |Cite
|
Sign up to set email alerts
|

Covert Secret Key Generation With an Active Warden

Abstract: We investigate the problem of covert and secret key generation over a state-dependent discrete memoryless channel with one-way public discussion in which an adversary, the warden, may arbitrarily choose the channel state. We develop an adaptive protocol that, under conditions that we explicitly specify, not only allows the transmitter and the legitimate receiver to exchange a secret key but also conceals from the active warden whether the protocol is being run. When specialized to passive adversaries that do n… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 16 publications
(2 citation statements)
references
References 24 publications
0
2
0
Order By: Relevance
“…In recent years, the concept of covertness has also been incorporated into other research fields, ranging from information theory to information security and wireless communications. Specific topics include secret key agreement [46], source coding [47], identification-via-channels [11], authentication [48], unmanned aerial vehicle [49]- [51], etc.…”
Section: B Related Workmentioning
confidence: 99%
“…In recent years, the concept of covertness has also been incorporated into other research fields, ranging from information theory to information security and wireless communications. Specific topics include secret key agreement [46], source coding [47], identification-via-channels [11], authentication [48], unmanned aerial vehicle [49]- [51], etc.…”
Section: B Related Workmentioning
confidence: 99%
“…Such uncertainty makes it difficult for the detector to determine the received signal power or the background noise power, and thus unable to distinguish between the scenarios with or without wireless communication by examining the power difference in these scenarios. Some recent works also explored the possibility of ensuring covertness based on other PLS technologies, such as multi-antenna technique [20], [21], coding scheme [22], [23], relay selection [24], [25] and resource (i.e., channel use) allocation [26].…”
mentioning
confidence: 99%