Secret Key Generation for Correlated Gaussian Sources

被引:38
|
作者
Nitinawarat, Sirin [1 ,2 ]
Narayan, Prakash [1 ,2 ]
机构
[1] Univ Maryland, Dept Elect & Comp Engn, College Pk, MD 20742 USA
[2] Univ Maryland, Syst Res Inst, College Pk, MD 20742 USA
基金
美国国家科学基金会;
关键词
Linear code; multiterminal Gaussian source model; nested lattice code; public communication; quantization; secret key capacity; strong secrecy; COMMON RANDOMNESS; QUANTIZATION; INFORMATION; CAPACITIES; CHANNEL; CODES;
D O I
10.1109/TIT.2012.2184075
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Secret key generation by multiple terminals is considered based on their observations of jointly distributed Gaussian signals, followed by public communication among themselves. Exploiting an inherent connection between secrecy generation and lossy data compression, two main contributions are made. The first is a characterization of strong secret key capacity, and entails a converse proof technique that is valid for real-valued (and not necessarily Gaussian) as well as finite-valued signals. The capacity formula acquires a simple form when the terminals observe "symmetrically correlated" jointly Gaussian signals. For the latter setup with two terminals, considering schemes that involve quantization at one terminal, the best rate of an achievable secret key is characterized as a function of quantization rate; secret key capacity is attained as the quantization rate tends to infinity. Structured codes are shown to attain the optimum tradeoff between secret key rate and quantization rate, constituting our second main contribution.
引用
收藏
页码:3373 / 3391
页数:19
相关论文
共 50 条
  • [21] Secret Key Generation for a Pairwise Independent Network Model
    Nitinawarat, Sirin
    Ye, Chunxuan
    Barg, Alexander
    Narayan, Prakash
    Reznik, Alex
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2010, 56 (12) : 6482 - 6489
  • [22] Secret Key Generation Through a Relay
    Kittichokechai, Kittipong
    Schaefer, Rafael F.
    Caire, Giuseppe
    2016 IEEE INFORMATION THEORY WORKSHOP (ITW), 2016,
  • [23] Physical-Layer Secret and Private Key Generation in Wireless Relay Networks With Correlated Eavesdropping Channels
    Xu, Peng
    Yang, Jun
    Chen, Gaojie
    Yang, Zheng
    Li, Yong
    Win, Moe Z.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 985 - 1000
  • [24] Secret-Key Generation Using Compound Sources and One-Way Public Communication
    Tavangaran, Nima
    Boche, Holger
    Schaefer, Rafael F.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (01) : 227 - 241
  • [25] Secret Key Agreement Using Correlated Sources over the Generalized Multiple Access Channel
    Salimi, Somayeh
    Skoglund, Mikael
    2012 IEEE INFORMATION THEORY WORKSHOP (ITW), 2012, : 467 - 471
  • [26] Secret Key Agreement From Vector Gaussian Sources by Rate Limited Public Communication
    Watanabe, Shun
    Oohama, Yasutada
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (03) : 541 - 550
  • [27] Secret Key Generation Via Localization and Mobility
    Gungor, Onur
    Chen, Fangzhou
    Koksal, Can Emre
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2015, 64 (06) : 2214 - 2230
  • [28] Authentication Based on Secret-Key Generation
    Willems, Frans M. J.
    Ignatenko, Tanya
    2012 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS (ISIT), 2012,
  • [29] Distillation of secret-key from a class of compound memoryless quantum sources
    Boche, H.
    Janssen, G.
    JOURNAL OF MATHEMATICAL PHYSICS, 2016, 57 (08)
  • [30] Secret-Key Capacity of Infinite Compound Sources with Communication Rate Constraint
    Tavangaran, Nima
    Boche, Holger
    Schaefer, Rafael F.
    2017 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2017,