Communication-Constrained Secret Key Generation: Second-Order Bounds

被引:0
|
作者
Hentila, Henri [1 ]
Shkel, Yanina Y. [2 ]
Koivunen, Visa [1 ]
机构
[1] Aalto Univ, Dept Informat & Commun Engn, Espoo 00076, Finland
[2] Ecole Polytech Fed Lausanne EPFL, Sch Comp & Commun Sci, Lausanne, Switzerland
关键词
rate-limited communication; second-order bounds; Secret key generation; one-shot bounds; finite-blocklength analysis; INFORMATION-THEORY; COMMON RANDOMNESS; AGREEMENT; CAPACITY; NETWORK;
D O I
10.1109/TIT.2024.3460474
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We study communication-constrained secret key generation, where two legitimate parties would like to generate a secret key using communication subject to a rate constraint. The problem is studied in the finite-blocklength regime. In this regime, the use of auxiliary random variables subject to Markov chain conditions in the corresponding asymptotic bounds has proven to make most existing proof techniques insufficient. However, two recently proposed proof techniques - one for the achievability side based on Poisson matching, and another for the converse side based on reverse hypercontractivity - allow us to overcome these issues to some extent. Based on these techniques, novel one-shot and second-order achievability and converse bounds are derived for the problem. While the second-order bounds do not coincide, leaving a precise second-order characterization of the problem an open issue, they improve upon the previously known tightest bounds. The second-order bounds are demonstrated for two simple sources: the binary symmetric source and the Gaussian symmetric source. For the binary source, we find that the gap between the two bounds is mainly due to an unwanted constant in the converse bound, and the non-convexity of the achievability bound.
引用
收藏
页码:8180 / 8203
页数:24
相关论文
共 50 条
  • [1] Secret Key Agreement: General Capacity and Second-Order Asymptotics
    Hayashi, Masahito
    Tyagi, Himanshu
    Watanabe, Shun
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2016, 62 (07) : 3796 - 3810
  • [2] Secret Key Agreement: General Capacity and Second-Order Asymptotics
    Hayashi, Masahito
    Tyagi, Himanshu
    Watanabe, Shun
    2014 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2014, : 1136 - 1140
  • [3] Second-Order Asymptotics for One-way Secret Key Agreement
    Poostindouz, Alireza
    Safavi-Naini, Reihaneh
    2021 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2021, : 1254 - 1259
  • [4] Generation of signals with specified second-order properties for constrained systems
    Larsson, Christian A.
    Hagg, Per
    Hjalmarsson, Hakan
    INTERNATIONAL JOURNAL OF ADAPTIVE CONTROL AND SIGNAL PROCESSING, 2016, 30 (03) : 456 - 472
  • [5] Second-Order Analysis of Secret-Key Capacity From a MIMO Channel
    Maksud, Ahmed
    Hua, Yingbo
    MILCOM 2023 - 2023 IEEE MILITARY COMMUNICATIONS CONFERENCE, 2023,
  • [6] AMPLITUDE BOUNDS FOR SECOND-ORDER NONAUTONOMOUS SYSTEMS
    HEWIT, JR
    STOREY, C
    PROCEEDINGS OF THE INSTITUTION OF ELECTRICAL ENGINEERS-LONDON, 1969, 116 (12): : 2069 - &
  • [7] BOUNDS FOR SECOND-ORDER PERTURBATION-THEORY
    BURROWS, BL
    JOURNAL OF PHYSICS B-ATOMIC MOLECULAR AND OPTICAL PHYSICS, 1974, 7 (08) : 881 - 891
  • [8] Bounds for contractive semigroups and second-order systems
    Veselic, Kresimir
    OPERATOR THEORY IN KREIN SPACES AND NONLINEAR EIGENVALUE PROBLEMS, 2006, 162 : 293 - 308
  • [9] First-order and second-order conditions for error bounds
    Wu, ZL
    Ye, JJ
    SIAM JOURNAL ON OPTIMIZATION, 2004, 14 (03) : 621 - 645
  • [10] Alternative second-order conditions in constrained optimization
    Weiss, H
    Ben-Asher, JZ
    JOURNAL OF OPTIMIZATION THEORY AND APPLICATIONS, 2001, 109 (02) : 441 - 455