Secret Key Generation over Noisy Channels with Common Randomness

被引:0
作者
Bassi, German [1 ]
Piantanida, Pablo [2 ]
Shamai , Shlomo [3 ]
机构
[1] KTH Royal Inst Technol, Sch Elect Engn, Stockholm, Sweden
[2] Univ Paris Sud, CNRS, Cent Supelec, Signaux & Syst Lab, Gif Sur Yvette, France
[3] Technion Israel Inst Technol, Dept Elect Engn, Haifa, Israel
来源
2016 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY | 2016年
关键词
INFORMATION; AGREEMENT;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper investigates the problem of secret key generation over a wiretap channel when the terminals have access to correlated sources. These sources are independent of the main channel and the users observe them before the transmission takes place. A novel achievable scheme for this model is proposed and is shown to be optimal under certain less noisy conditions. This result improves upon the existing literature where the more stringent condition of degradedness was needed.
引用
收藏
页码:510 / 514
页数:5
相关论文
共 15 条
[1]   COMMON RANDOMNESS IN INFORMATION-THEORY AND CRYPTOGRAPHY .1. SECRET SHARING [J].
AHLSWEDE, R ;
CSISZAR, I .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1993, 39 (04) :1121-1132
[2]  
[Anonymous], 2011, Network information theory
[3]  
Bassi G., 2015, ARXIV150707091CSMATH
[4]  
Chorti A, 2016, LECT NOTES ELECTR EN, V358, P1, DOI 10.1007/978-3-319-23609-4_1
[5]  
CSISZAR I, 1978, IEEE T INFORM THEORY, V24, P339, DOI 10.1109/TIT.1978.1055892
[6]   Common randomness and secret key generation with a helper [J].
Csiszár, I ;
Narayan, P .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2000, 46 (02) :344-366
[7]   Secret-Key Generation Using Correlated Sources and Channels [J].
Khisti, Ashish ;
Diggavi, Suhas N. ;
Wornell, Gregory W. .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2012, 58 (02) :652-670
[8]  
Liang Y., 2008, FDN TRENDS COMMUNICA, V5
[9]  
MAURER UM, 1993, IEEE T INFORM THEORY, V39, P733, DOI 10.1109/18.256484
[10]   Secrecy via Sources and Channels [J].
Prabhakaran, Vinod M. ;
Eswaran, Krishnan ;
Ramchandran, Kannan .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2012, 58 (11) :6747-6765