Secret Key Generation for Correlated Gaussian Sources

被引:38
作者
Nitinawarat, Sirin [1 ,2 ]
Narayan, Prakash [1 ,2 ]
机构
[1] Univ Maryland, Dept Elect & Comp Engn, College Pk, MD 20742 USA
[2] Univ Maryland, Syst Res Inst, College Pk, MD 20742 USA
基金
美国国家科学基金会;
关键词
Linear code; multiterminal Gaussian source model; nested lattice code; public communication; quantization; secret key capacity; strong secrecy; COMMON RANDOMNESS; QUANTIZATION; INFORMATION; CAPACITIES; CHANNEL; CODES;
D O I
10.1109/TIT.2012.2184075
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Secret key generation by multiple terminals is considered based on their observations of jointly distributed Gaussian signals, followed by public communication among themselves. Exploiting an inherent connection between secrecy generation and lossy data compression, two main contributions are made. The first is a characterization of strong secret key capacity, and entails a converse proof technique that is valid for real-valued (and not necessarily Gaussian) as well as finite-valued signals. The capacity formula acquires a simple form when the terminals observe "symmetrically correlated" jointly Gaussian signals. For the latter setup with two terminals, considering schemes that involve quantization at one terminal, the best rate of an achievable secret key is characterized as a function of quantization rate; secret key capacity is attained as the quantization rate tends to infinity. Structured codes are shown to attain the optimum tradeoff between secret key rate and quantization rate, constituting our second main contribution.
引用
收藏
页码:3373 / 3391
页数:19
相关论文
共 50 条
  • [41] Secret Key Generation From Mobility
    Gungor, Onur
    Chen, Fangzhou
    Koksal, C. Emre
    2011 IEEE GLOBECOM WORKSHOPS (GC WKSHPS), 2011, : 874 - 878
  • [42] Broadcasting Correlated Gaussian Sources with Bandwidth Expansion
    Behroozi, Hamid
    Alajaji, Fady
    Linder, Tamas
    2009 IEEE INFORMATION THEORY WORKSHOP (ITW 2009), 2009, : 313 - 317
  • [43] Transmission of Correlated Gaussian Sources with Opportunistic Interference
    Alay, Ozgu
    Argyriou, Antonios
    2014 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2014, : 281 - 286
  • [44] Secret Key Generation With Limited Interaction
    Liu, Jingbo
    Cuff, Paul
    Verdu, Sergio
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2017, 63 (11) : 7358 - 7381
  • [45] Physical Layer Secret Key Capacity Using Correlated Wireless Channel Samples
    Wang, Xu
    Jin, Liang
    Huang, Kaizhi
    Li, Mingliang
    Ming, Yi
    2016 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2016,
  • [46] On the Communication Complexity of Secret Key Generation in the Multiterminal Source Model
    Mukherjee, Manuj
    Kashyap, Navin
    2014 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2014, : 1151 - 1155
  • [47] GROUP SECRET KEY GENERATION FOR 5G Networks
    Allam, Ali M.
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2019, 13 (08) : 4041 - 4059
  • [48] Secret Key Generation for Pairwise Independent Networks with Curious Helpers
    Lin, Pin-Hsun
    Janda, Carsten R.
    Jorswieck, Eduard A.
    Hong, Yao-Win Peter
    2017 IEEE 18TH INTERNATIONAL WORKSHOP ON SIGNAL PROCESSING ADVANCES IN WIRELESS COMMUNICATIONS (SPAWC), 2017,
  • [49] Relay-based Secret Key Generation in LTE-A
    Chen, Kan
    Natarajan, Balasubramaniam
    Shattil, Steve
    2014 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2014, : 139 - 144
  • [50] Key Capacity for Product Sources With Application to Stationary Gaussian Processes
    Liu, Jingbo
    Cuff, Paul
    Verdu, Sergio
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2016, 62 (02) : 984 - 1005