Secret key generation over noisy channels with common randomness

Autor: Shlomo Shamai, Pablo Piantanida, German Bassi
Přispěvatelé: Laboratoire des signaux et systèmes (L2S), Université Paris-Sud - Paris 11 (UP11)-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS), Department of Electrical Engineering - Technion [Haïfa] (EE-Technion), Technion - Israel Institute of Technology [Haifa], Piantanida, Pablo
Jazyk: angličtina
Rok vydání: 2016
Předmět:
Scheme (programming language)
021110 strategic
defence & security studies

Key generation
Computer science
0211 other engineering and technologies
[MATH.MATH-IT]Mathematics [math]/Information Theory [math.IT]
020206 networking & telecommunications
02 engineering and technology
Topology
[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]
[MATH.MATH-IT] Mathematics [math]/Information Theory [math.IT]
Transmission (telecommunications)
[INFO.INFO-IT]Computer Science [cs]/Information Theory [cs.IT]
[MATH.MATH-ST]Mathematics [math]/Statistics [math.ST]
0202 electrical engineering
electronic engineering
information engineering

[INFO.INFO-IT] Computer Science [cs]/Information Theory [cs.IT]
computer
[MATH.MATH-ST] Mathematics [math]/Statistics [math.ST]
Communication channel
computer.programming_language
Zdroj: 2016 IEEE International Symposium on Information Theory (ISIT)
2016 IEEE International Symposium on Information Theory (ISIT), Jul 2016, Barcelona, Spain. ⟨10.1109/ISIT.2016.7541351⟩
DOI: 10.1109/ISIT.2016.7541351⟩
Popis: Information Theory, IEEE Transactions on (revised); This paper investigates the problem of secret key generation over a wiretap channel when the terminals observe correlated sources. These sources may or may not be independent of the main channel and the users overhear them before the transmission takes place. A novel achievable scheme for the case of independent sources is proposed, and it is shown to be optimal under certain less noisy conditions. This result improves upon the existing literature where the more stringent condition of degradedness was needed. For the situation where the sources are correlated with the main channel, a second achievable scheme based on joint source-channel coding is introduced, for which special cases of binary and Gaussian channels are studied. Some optimality results are derived, however, these are much less general than for the first setup.
Databáze: OpenAIRE