Secret Key Generation for Correlated Gaussian Sources

被引:38
|
作者
Nitinawarat, Sirin [1 ,2 ]
Narayan, Prakash [1 ,2 ]
机构
[1] Univ Maryland, Dept Elect & Comp Engn, College Pk, MD 20742 USA
[2] Univ Maryland, Syst Res Inst, College Pk, MD 20742 USA
基金
美国国家科学基金会;
关键词
Linear code; multiterminal Gaussian source model; nested lattice code; public communication; quantization; secret key capacity; strong secrecy; COMMON RANDOMNESS; QUANTIZATION; INFORMATION; CAPACITIES; CHANNEL; CODES;
D O I
10.1109/TIT.2012.2184075
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Secret key generation by multiple terminals is considered based on their observations of jointly distributed Gaussian signals, followed by public communication among themselves. Exploiting an inherent connection between secrecy generation and lossy data compression, two main contributions are made. The first is a characterization of strong secret key capacity, and entails a converse proof technique that is valid for real-valued (and not necessarily Gaussian) as well as finite-valued signals. The capacity formula acquires a simple form when the terminals observe "symmetrically correlated" jointly Gaussian signals. For the latter setup with two terminals, considering schemes that involve quantization at one terminal, the best rate of an achievable secret key is characterized as a function of quantization rate; secret key capacity is attained as the quantization rate tends to infinity. Structured codes are shown to attain the optimum tradeoff between secret key rate and quantization rate, constituting our second main contribution.
引用
收藏
页码:3373 / 3391
页数:19
相关论文
共 50 条
  • [31] Covert Secret Key Generation
    Tahmasbi, Mehrdad
    Bloch, Matthieu R.
    2017 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2017, : 540 - 544
  • [32] On the Key Generation From Correlated Wireless Channels
    Zhang, Junqing
    He, Biao
    Duong, Trung Q.
    Woods, Roger
    IEEE COMMUNICATIONS LETTERS, 2017, 21 (04) : 961 - 964
  • [33] On Reconstructing Linear Combinations of Correlated Gaussian Sources Over a MAC
    Ghasemi-Goojani, Shahab
    Behroozi, Hamid
    IEEE COMMUNICATIONS LETTERS, 2016, 20 (12) : 2450 - 2453
  • [34] Separation of Reliability and Secrecy in Rate-Limited Secret-Key Generation
    Chou, Remi A.
    Bloch, Matthieu R.
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2014, 60 (08) : 4941 - 4957
  • [35] Secret key generation over a Nakagami-m fading channel with correlated eavesdropping channel
    Shixun Gong
    Xiaofeng Tao
    Na Li
    Haowei Wang
    Jin Xu
    Science China Information Sciences, 2022, 65
  • [36] Secret key generation over a Nakagami-m fading channel with correlated eavesdropping channel
    Gong, Shixun
    Tao, Xiaofeng
    Li, Na
    Wang, Haowei
    Xu, Jin
    SCIENCE CHINA-INFORMATION SCIENCES, 2022, 65 (09)
  • [37] On Secret Key Generation From Finite Source Observations
    Tu, Wenwen
    Lai, Lifeng
    2014 48TH ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS (CISS), 2014,
  • [38] Secret Key Generation by Continuous Encryption Before Quantization
    Maksud, Ahmed
    Hua, Yingbo
    IEEE SIGNAL PROCESSING LETTERS, 2022, 29 : 1497 - 1501
  • [39] Multiple Private Key Generation for Continuous Memoryless Sources With a Helper
    Zhou, Lin
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 : 2629 - 2640
  • [40] New Dimensions for Physical Layer Secret Key Generation: Excursion Lengths-Based Key Generation
    Adil, Muhammad
    Ullah Khan, Habib
    Arif, Mohammad
    Shah Nawaz, Mian
    Khan, Faheem
    IEEE ACCESS, 2024, 12 : 82972 - 82983