Communication-Constrained Secret Key Generation: Second-Order Bounds

被引:0
|
作者
Hentila, Henri [1 ]
Shkel, Yanina Y. [2 ]
Koivunen, Visa [1 ]
机构
[1] Aalto Univ, Dept Informat & Commun Engn, Espoo 00076, Finland
[2] Ecole Polytech Fed Lausanne EPFL, Sch Comp & Commun Sci, Lausanne, Switzerland
关键词
rate-limited communication; second-order bounds; Secret key generation; one-shot bounds; finite-blocklength analysis; INFORMATION-THEORY; COMMON RANDOMNESS; AGREEMENT; CAPACITY; NETWORK;
D O I
10.1109/TIT.2024.3460474
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We study communication-constrained secret key generation, where two legitimate parties would like to generate a secret key using communication subject to a rate constraint. The problem is studied in the finite-blocklength regime. In this regime, the use of auxiliary random variables subject to Markov chain conditions in the corresponding asymptotic bounds has proven to make most existing proof techniques insufficient. However, two recently proposed proof techniques - one for the achievability side based on Poisson matching, and another for the converse side based on reverse hypercontractivity - allow us to overcome these issues to some extent. Based on these techniques, novel one-shot and second-order achievability and converse bounds are derived for the problem. While the second-order bounds do not coincide, leaving a precise second-order characterization of the problem an open issue, they improve upon the previously known tightest bounds. The second-order bounds are demonstrated for two simple sources: the binary symmetric source and the Gaussian symmetric source. For the binary source, we find that the gap between the two bounds is mainly due to an unwanted constant in the converse bound, and the non-convexity of the achievability bound.
引用
收藏
页码:8180 / 8203
页数:24
相关论文
共 50 条
  • [31] Lower Bounds for the Complexity of Monadic Second-Order Logic
    Kreutzer, Stephan
    Tazari, Siamak
    25TH ANNUAL IEEE SYMPOSIUM ON LOGIC IN COMPUTER SCIENCE (LICS 2010), 2010, : 189 - 198
  • [32] A comparison of Carlet's second-order nonlinearity bounds
    Mesnager, Sihem
    McGrew, Gavin
    Davis, James
    Steele, Dayton
    Marsten, Katherine
    INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2017, 94 (03) : 427 - 436
  • [33] Distributed Constrained Optimization for Second-Order Multiagent Systems via Event-Based Communication
    Huang, Yi
    Meng, Ziyang
    Sun, Jian
    IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2024, 54 (09): : 5317 - 5326
  • [34] Constrained variational problems governed by second-order Lagrangians
    Treanta, Savin
    APPLICABLE ANALYSIS, 2020, 99 (09) : 1467 - 1484
  • [35] Nonnegative matrix factorization with constrained second-order optimization
    Zdunek, Rafal
    Cichocki, Andrzej
    SIGNAL PROCESSING, 2007, 87 (08) : 1904 - 1916
  • [36] Secret Key Generation and Agreement in UWB Communication Channels
    Madiseh, Masoud Ghoreishi
    McGuire, Michael L.
    Neville, Stephen S.
    Cai, Lin
    Horie, Michael
    GLOBECOM 2008 - 2008 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2008,
  • [37] On second-order optimality conditions in constrained multiobjective optimization
    Bednarik, Dusan
    Pastor, Karel
    NONLINEAR ANALYSIS-THEORY METHODS & APPLICATIONS, 2011, 74 (04) : 1372 - 1382
  • [38] Identification of structurally constrained second-order Volterra models
    Pearson, RK
    Ogunnaike, BA
    Doyle, FJ
    IEEE TRANSACTIONS ON SIGNAL PROCESSING, 1996, 44 (11) : 2837 - 2846
  • [39] Second-order optimality conditions for constrained domain optimization
    Miller, D. F.
    JOURNAL OF OPTIMIZATION THEORY AND APPLICATIONS, 2007, 134 (03) : 413 - 432
  • [40] On Second-order Sufficient Conditions in Constrained Nonsmooth Optimization
    Wang Feng-ling1 and Song Wen2(1.Department of Mathematics and Applied Mathematics
    Communications in Mathematical Research, 2010, 26 (03) : 203 - 210