Secret-Key Generation Using Compound Sources and One-Way Public Communication

被引:17
|
作者
Tavangaran, Nima [1 ]
Boche, Holger [1 ]
Schaefer, Rafael F. [2 ,3 ]
机构
[1] Tech Univ Munich, Lehrstuhl Theoret Informat Tech, D-80290 Munich, Germany
[2] Princeton Univ, Dept Elect Engn, Princeton, NJ 08544 USA
[3] Tech Univ Berlin, Informat Theory & Applicat Chair, D-10587 Berlin, Germany
关键词
Compound source; secret-key capacity; common randomness; hypothesis testing; COMMON RANDOMNESS; INFORMATION-THEORY; CRYPTOGRAPHY; CAPACITY;
D O I
10.1109/TIFS.2016.2611484
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In the classical secret-key generation model, common randomness is generated by two terminals based on the observation of correlated components of a common source, while keeping it secret from a non-legitimate observer. It is assumed that the statistics of the source are known to all participants. In this paper, the secret-key generation based on a compound source is studied where the realization of the source statistic is unknown. The protocol should guarantee the security and reliability of the generated secret-key, simultaneously for all possible realizations of the compound source. A single-letter lower-bound of the secret-key capacity for a finite compound source is derived as a function of the public communication rate constraint. A multi-letter capacity formula is further computed for a finite compound source for the case in which the public communication is unconstrained. Finally, a single-letter capacity formula is derived for a degraded compound source with an arbitrary (possibly infinite) set of source states and a finite set of marginal states.
引用
收藏
页码:227 / 241
页数:15
相关论文
共 50 条
  • [31] On the Ergodic Secret-Key Agreement Over Spatially Correlated Multiple-Antenna Channels With Public Discussion
    Zorgui, Marwen
    Rezki, Zouheir
    Alomair, Basel
    Jorswieck, Eduard A.
    Alouini, Mohamed-Slim
    IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2016, 64 (02) : 495 - 510
  • [32] Secret Key Agreement from Correlated Gaussian,Sources by Rate Limited Public Communication
    Watanabe, Shun
    Oohama, Yasutada
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2010, E93A (11) : 1976 - 1983
  • [33] Communication-Constrained Secret Key Generation: Second-Order Bounds
    Hentila, Henri
    Shkel, Yanina Y.
    Koivunen, Visa
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2024, 70 (11) : 8180 - 8203
  • [34] Secret Key Agreement From Vector Gaussian Sources by Rate Limited Public Communication
    Watanabe, Shun
    Oohama, Yasutada
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (03) : 541 - 550
  • [35] MULTISTAGE SECRET SHARING BASED ON ONE-WAY FUNCTION
    HE, J
    DAWSON, E
    ELECTRONICS LETTERS, 1994, 30 (19) : 1591 - 1592
  • [36] Secret Key Generation for Minimally Connected Hypergraphical Sources
    Zhou, Qiaoqiao
    Chan, Chung
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2020, 66 (07) : 4226 - 4244
  • [37] MULTISTAGE SECRET SHARING BASED ON ONE-WAY FUNCTION
    HARN, L
    ELECTRONICS LETTERS, 1995, 31 (04) : 262 - 262
  • [38] High-rate Secret Key Generation Method Using Two-way Random Signal
    Zhang, Shengjun
    Jin, Liang
    Lou, Yangming
    Huang, Kaizhi
    Zhong, Zhou
    2018 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC 2018), 2018, : 32 - 36
  • [39] Secret Key Generation Using Channel Quantization with SVD for Reciprocal MIMO Channels
    Furqan, Haji M.
    Hamamreh, Jehad M.
    Arslan, Huseyin
    2016 13TH INTERNATIONAL SYMPOSIUM ON WIRELESS COMMUNICATION SYSTEMS (ISWCS), 2016, : 597 - 602
  • [40] Secret Key Generation from Correlated Sources and Secure Link
    Cao, Daming
    Kang, Wei
    2017 9TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS AND SIGNAL PROCESSING (WCSP), 2017,