{"title":"使用拜占庭助手生成密钥","authors":"Wenwen Tu, L. Lai","doi":"10.1109/ICCW.2015.7247217","DOIUrl":null,"url":null,"abstract":"This paper considers the problem of key generation with a helper, which might be subjected to Byzantine attacks. If the helper is not under attack, it will follow the key generation protocol. However, if the helper is under attack, it will modify the messages to mislead the key generation parties. We propose a scheme that can benefit from the helper, if the helper is not under attack, and can detect the presence of the attack, if the helper is under Byzantine attacks. We show that our key generation scheme can achieve the secret key capacity when the helper is not under attack. At the same time, if the helper is under Byzantine attacks, our scheme can achieve the key rate as if the attacker is a passive eavesdropper.","PeriodicalId":6464,"journal":{"name":"2015 IEEE International Conference on Communication Workshop (ICCW)","volume":"42 1","pages":"429-434"},"PeriodicalIF":0.0000,"publicationDate":"2015-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Key generation with a Byzantine helper\",\"authors\":\"Wenwen Tu, L. Lai\",\"doi\":\"10.1109/ICCW.2015.7247217\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper considers the problem of key generation with a helper, which might be subjected to Byzantine attacks. If the helper is not under attack, it will follow the key generation protocol. However, if the helper is under attack, it will modify the messages to mislead the key generation parties. We propose a scheme that can benefit from the helper, if the helper is not under attack, and can detect the presence of the attack, if the helper is under Byzantine attacks. We show that our key generation scheme can achieve the secret key capacity when the helper is not under attack. At the same time, if the helper is under Byzantine attacks, our scheme can achieve the key rate as if the attacker is a passive eavesdropper.\",\"PeriodicalId\":6464,\"journal\":{\"name\":\"2015 IEEE International Conference on Communication Workshop (ICCW)\",\"volume\":\"42 1\",\"pages\":\"429-434\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-06-08\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 IEEE International Conference on Communication Workshop (ICCW)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCW.2015.7247217\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 IEEE International Conference on Communication Workshop (ICCW)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCW.2015.7247217","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
This paper considers the problem of key generation with a helper, which might be subjected to Byzantine attacks. If the helper is not under attack, it will follow the key generation protocol. However, if the helper is under attack, it will modify the messages to mislead the key generation parties. We propose a scheme that can benefit from the helper, if the helper is not under attack, and can detect the presence of the attack, if the helper is under Byzantine attacks. We show that our key generation scheme can achieve the secret key capacity when the helper is not under attack. At the same time, if the helper is under Byzantine attacks, our scheme can achieve the key rate as if the attacker is a passive eavesdropper.