Secret key generation over noisy channels with common randomness
Autor: | Shlomo Shamai, Pablo Piantanida, German Bassi |
---|---|
Přispěvatelé: | Laboratoire des signaux et systèmes (L2S), Université Paris-Sud - Paris 11 (UP11)-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS), Department of Electrical Engineering - Technion [Haïfa] (EE-Technion), Technion - Israel Institute of Technology [Haifa], Piantanida, Pablo |
Jazyk: | angličtina |
Rok vydání: | 2016 |
Předmět: |
Scheme (programming language)
021110 strategic defence & security studies Key generation Computer science 0211 other engineering and technologies [MATH.MATH-IT]Mathematics [math]/Information Theory [math.IT] 020206 networking & telecommunications 02 engineering and technology Topology [INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI] [MATH.MATH-IT] Mathematics [math]/Information Theory [math.IT] Transmission (telecommunications) [INFO.INFO-IT]Computer Science [cs]/Information Theory [cs.IT] [MATH.MATH-ST]Mathematics [math]/Statistics [math.ST] 0202 electrical engineering electronic engineering information engineering [INFO.INFO-IT] Computer Science [cs]/Information Theory [cs.IT] computer [MATH.MATH-ST] Mathematics [math]/Statistics [math.ST] Communication channel computer.programming_language |
Zdroj: | 2016 IEEE International Symposium on Information Theory (ISIT) 2016 IEEE International Symposium on Information Theory (ISIT), Jul 2016, Barcelona, Spain. ⟨10.1109/ISIT.2016.7541351⟩ |
DOI: | 10.1109/ISIT.2016.7541351⟩ |
Popis: | Information Theory, IEEE Transactions on (revised); This paper investigates the problem of secret key generation over a wiretap channel when the terminals observe correlated sources. These sources may or may not be independent of the main channel and the users overhear them before the transmission takes place. A novel achievable scheme for the case of independent sources is proposed, and it is shown to be optimal under certain less noisy conditions. This result improves upon the existing literature where the more stringent condition of degradedness was needed. For the situation where the sources are correlated with the main channel, a second achievable scheme based on joint source-channel coding is introduced, for which special cases of binary and Gaussian channels are studied. Some optimality results are derived, however, these are much less general than for the first setup. |
Databáze: | OpenAIRE |
Externí odkaz: |