{"title":"Key generation with a Byzantine helper","authors":"Wenwen Tu, L. Lai","doi":"10.1109/ICCW.2015.7247217","DOIUrl":null,"url":null,"abstract":"This paper considers the problem of key generation with a helper, which might be subjected to Byzantine attacks. If the helper is not under attack, it will follow the key generation protocol. However, if the helper is under attack, it will modify the messages to mislead the key generation parties. We propose a scheme that can benefit from the helper, if the helper is not under attack, and can detect the presence of the attack, if the helper is under Byzantine attacks. We show that our key generation scheme can achieve the secret key capacity when the helper is not under attack. At the same time, if the helper is under Byzantine attacks, our scheme can achieve the key rate as if the attacker is a passive eavesdropper.","PeriodicalId":6464,"journal":{"name":"2015 IEEE International Conference on Communication Workshop (ICCW)","volume":"42 1","pages":"429-434"},"PeriodicalIF":0.0000,"publicationDate":"2015-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 IEEE International Conference on Communication Workshop (ICCW)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCW.2015.7247217","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
This paper considers the problem of key generation with a helper, which might be subjected to Byzantine attacks. If the helper is not under attack, it will follow the key generation protocol. However, if the helper is under attack, it will modify the messages to mislead the key generation parties. We propose a scheme that can benefit from the helper, if the helper is not under attack, and can detect the presence of the attack, if the helper is under Byzantine attacks. We show that our key generation scheme can achieve the secret key capacity when the helper is not under attack. At the same time, if the helper is under Byzantine attacks, our scheme can achieve the key rate as if the attacker is a passive eavesdropper.