Secret-key generation with correlated sources and noisy channels

被引:19
|
作者
Khisti, Ashish [1 ]
Diggavi, Suhas N. [2 ]
Wornell, Gregory [1 ]
机构
[1] MIT, Dept EECS, 77 Massachusetts Ave, Cambridge, MA 02139 USA
[2] Ecole Polytech Fed Lausanne, Sch CCS, Lausanne, Switzerland
关键词
D O I
10.1109/ISIT.2008.4595138
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A joint-source-channel setup for secret-key generation between remote terminals is considered. The sender communicates to the receiver over a discrete memoryless wiretap channel and the sender and receiver observe a pair of correlated discrete memoryless sources. Lower and upper bounds for the secret-key rate are presented and shown to coincide for the case when the underlying channel is a reversely degraded parallel channel. Our setup also provides an operational significance to the rate-equivocation tradeoff of the wiretap channel, and this is illustrated in detail for the Gaussian case.
引用
收藏
页码:1005 / +
页数:2
相关论文
共 50 条
  • [1] Secret-Key Generation Using Correlated Sources and Channels
    Khisti, Ashish
    Diggavi, Suhas N.
    Wornell, Gregory W.
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2012, 58 (02) : 652 - 670
  • [2] A Remark on Secret-Key Generation over Correlated Fading Channels
    Khisti, Ashish
    Diggavi, Suhas N.
    [J]. 2011 IEEE GLOBECOM WORKSHOPS (GC WKSHPS), 2011, : 864 - 868
  • [3] The Secret Key Capacity of a Class of Noisy Channels with Correlated Sources
    Bassi, German
    Piantanida, Pablo
    Shamai , Shlomo
    [J]. ENTROPY, 2019, 21 (08)
  • [4] On Secret-Key Generation Using Wideband Channels in Mobile Networks
    Shen, Yuan
    Win, Moe Z.
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2015, : 4151 - 4156
  • [5] Secret-key generation from wireless channels: Mind the reflections
    Vogt, Hendrik
    Sezgin, Aydin
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC), 2014, : 783 - 788
  • [6] Secret Key Generation for Correlated Gaussian Sources
    Nitinawarat, Sirin
    Narayan, Prakash
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2012, 58 (06) : 3373 - 3391
  • [7] Secret Key Generation for Correlated Gaussian Sources
    Nitinawarat, Sirin
    [J]. 2008 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS, VOLS 1-6, 2008, : 702 - 706
  • [8] Authentication Based on Secret-Key Generation
    Willems, Frans M. J.
    Ignatenko, Tanya
    [J]. 2012 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS (ISIT), 2012,
  • [9] Secret-Key Agreement Using Physical Identifiers for Degraded and Less Noisy Authentication Channels
    Yachongka, Vamoua
    Yagi, Hideki
    Ochiai, Hideki
    [J]. 2022 IEEE INFORMATION THEORY WORKSHOP (ITW), 2022, : 232 - 237
  • [10] Polar Coding for Secret-Key Generation
    Chou, Remi A.
    Bloch, Matthieu R.
    Abbe, Emmanuel
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2015, 61 (11) : 6213 - 6237