Secret Key Generation for Correlated Gaussian Sources

被引:38
|
作者
Nitinawarat, Sirin [1 ,2 ]
Narayan, Prakash [1 ,2 ]
机构
[1] Univ Maryland, Dept Elect & Comp Engn, College Pk, MD 20742 USA
[2] Univ Maryland, Syst Res Inst, College Pk, MD 20742 USA
基金
美国国家科学基金会;
关键词
Linear code; multiterminal Gaussian source model; nested lattice code; public communication; quantization; secret key capacity; strong secrecy; COMMON RANDOMNESS; QUANTIZATION; INFORMATION; CAPACITIES; CHANNEL; CODES;
D O I
10.1109/TIT.2012.2184075
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Secret key generation by multiple terminals is considered based on their observations of jointly distributed Gaussian signals, followed by public communication among themselves. Exploiting an inherent connection between secrecy generation and lossy data compression, two main contributions are made. The first is a characterization of strong secret key capacity, and entails a converse proof technique that is valid for real-valued (and not necessarily Gaussian) as well as finite-valued signals. The capacity formula acquires a simple form when the terminals observe "symmetrically correlated" jointly Gaussian signals. For the latter setup with two terminals, considering schemes that involve quantization at one terminal, the best rate of an achievable secret key is characterized as a function of quantization rate; secret key capacity is attained as the quantization rate tends to infinity. Structured codes are shown to attain the optimum tradeoff between secret key rate and quantization rate, constituting our second main contribution.
引用
收藏
页码:3373 / 3391
页数:19
相关论文
共 50 条
  • [1] The Gaussian Wiretap Channel with Correlated Sources at the Terminals: Secret Communication and Key Generation
    Bunin, Alexander
    Piantanida, Pablo
    Shamai , Shlomo
    2016 IEEE INTERNATIONAL CONFERENCE ON THE SCIENCE OF ELECTRICAL ENGINEERING (ICSEE), 2016,
  • [2] Secret Key Agreement from Correlated Gaussian,Sources by Rate Limited Public Communication
    Watanabe, Shun
    Oohama, Yasutada
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2010, E93A (11) : 1976 - 1983
  • [3] Secret key generation from Gaussian sources using lattice hashing
    Ling, Cong
    Luzzi, Laura
    Bloch, Matthieu R.
    2013 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS (ISIT), 2013, : 2621 - +
  • [4] Secret-Key Generation Using Correlated Sources and Channels
    Khisti, Ashish
    Diggavi, Suhas N.
    Wornell, Gregory W.
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2012, 58 (02) : 652 - 670
  • [5] Secret Key Generation from Correlated Sources and Secure Link
    Cao, Daming
    Kang, Wei
    2017 9TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS AND SIGNAL PROCESSING (WCSP), 2017,
  • [6] Optimal Rate-Limited Secret Key Generation From Gaussian Sources Using Lattices
    Luzzi, Laura
    Ling, Cong
    Bloch, Matthieu R.
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2023, 69 (08) : 4944 - 4960
  • [7] Secret key capacity for ergodic correlated sources
    Tochikubo, K
    Uyematsu, T
    Matsumoto, R
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2004, E87A (06) : 1651 - 1654
  • [8] Secret Key Generation From Vector Gaussian Sources With Public and Private Communications
    Xu, Yinfei
    Cao, Daming
    2020 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2020, : 1101 - 1105
  • [9] Secret Key Generation From Vector Gaussian Sources With Public and Private Communications
    Xu, Yinfei
    Cao, Daming
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2021, 67 (08) : 5420 - 5431
  • [10] The Secret Key Capacity of a Class of Noisy Channels with Correlated Sources
    Bassi, German
    Piantanida, Pablo
    Shamai , Shlomo
    ENTROPY, 2019, 21 (08)