Secret-Key Generation Using Correlated Sources and Channels
نویسندگان
چکیده
منابع مشابه
Optimal SVD-based Precoding for Secret Key Extraction from Correlated OFDM Sub-Channels
Secret key extraction is a crucial issue in physical layer security and a less complex and, at the same time, a more robust scheme for the next generation of 5G and beyond. Unlike previous works on this topic, in which Orthogonal Frequency Division Multiplexing (OFDM) sub-channels were considered to be independent, the effect of correlation between sub-channels on the secret key rate is address...
متن کاملSecret key generation from Gaussian sources using lattices
We propose a simple lattice-based scheme for secret key generation from Gaussian sources in the presence of an eavesdropper, and show that we achieve strong secret key rates up to 1/2 nat from the optimal in the case of degraded source models. Our scheme is based on the notion of flatness factor, and does not require dithering.
متن کاملSecrecy via sources and channels - A secret key - Secret message rate tradeoff region
Alice and Bob want to share a secret key and to communicate an independent message, both of which they desire to be kept secret from an eavesdropper Eve. We study this problem of secret communication and secret key generation when two resources are available – correlated sources at Alice, Bob, and Eve, and a noisy broadcast channel from Alice to Bob and Eve which is independent of the sources. ...
متن کاملSecret Key Generation and Eavesdropping detection using Quantum Cryptography
Quantum Cryptography is based upon the use of quantum effects and extends those effects for conventional cryptographic methods. The two major advantages of quantum cryptography over conventional cryptography are true random secret key generation and eavesdropping detection. Quantum cryptography has been developed which promises more secure communication than any existing technique and cannot be...
متن کاملSecret Key Agreement from Correlated Gaussian Sources by Rate Limited Public Communication
We investigate the secret key agreement from correlated Gaussian sources in which the legitimate parties can use the public communication with limited rate. For the class of protocols with the one-way public communication, we show a closed form expression of the optimal trade-off between the rate of key generation and the rate of the public communication. Our results clarify an essential differ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Information Theory
سال: 2012
ISSN: 0018-9448,1557-9654
DOI: 10.1109/tit.2011.2173629