Secret-Key Generation Using Correlated Sources and Channels

IEEE Transactions on Information Theory(2012)

引用 77|浏览1
暂无评分
摘要
We study the secret-key capacity in a joint source-channel coding setup-the terminals are connected over a discrete memoryless channel and have access to side information, modelled as a pair of discrete memoryless source sequences. As our main result, we establish the upper and lower bounds on the secret-key capacity. In the lower bound expression, the equivocation terms of the source and channel components are functionally additive even though the coding scheme generates a single secret-key by jointly taking into account the source and channel equivocations. Our bounds coincide, thus establishing the capacity, when the underlying wiretap channel can be decomposed into a set of independent, parallel, and reversely degraded channels. For the case of parallel Gaussian channels and jointly Gaussian sources we show that Gaussian codebooks achieve the secret-key capacity. In addition, when the eavesdropper also observes a correlated side information sequence, we establish the secret-key capacity when both the source and channel of the eavesdropper are a degraded version of the legitimate receiver. We finally also treat the case when a public discussion channel is available, propose a separation based coding scheme, and establish its optimality when the channel output symbols of the legitimate receiver and eavesdropper are conditionally independent given the input.
更多
查看译文
关键词
coding scheme,public discussion channel,discrete memoryless channel,correlated sources,reversely degraded channel,legitimate receiver,parallel gaussian channel,secret-key capacity,channel output symbol,channel equivocation,secret-key generation,channel component,information theoretic security,source coding,lower bound,upper bound,channel coding,information rate,random variables,cryptography,random variable,conditional independence,upper and lower bounds
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要