Secret key generation from Gaussian sources using lattices

نویسندگان

  • Cong Ling
  • Laura Luzzi
  • Matthieu Bloch
چکیده

We propose a simple lattice-based scheme for secret key generation from Gaussian sources in the presence of an eavesdropper, and show that we achieve strong secret key rates up to 1/2 nat from the optimal in the case of degraded source models. Our scheme is based on the notion of flatness factor, and does not require dithering.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secret Key Agreement from Correlated Gaussian Sources by Rate Limited Public Communication

We investigate the secret key agreement from correlated Gaussian sources in which the legitimate parties can use the public communication with limited rate. For the class of protocols with the one-way public communication, we show a closed form expression of the optimal trade-off between the rate of key generation and the rate of the public communication. Our results clarify an essential differ...

متن کامل

Lattice Codes for Secure Communication and Secret Key Generation

In this work, we study two problems in information-theoretic security. Firstly, we study a wireless network where two nodes want to securely exchange messages via an honestbut-curious bidirectional relay. There is no direct link between the user nodes, and all communication must take place through the relay. The relay behaves like a passive eavesdropper, but otherwise follows the protocol it is...

متن کامل

Lower bounds of shortest vector lengths in random knapsack lattices and random NTRU lattices

Finding the shortest vector of a lattice is one of the most important problems in computational lattice theory. For a random lattice, one can estimate the length of the shortest vector using the Gaussian heuristic. However, no rigorous proof can be provided for some classes of lattices, as the Gaussian heuristic may not hold for them. In the paper we study two types of random lattices in crypto...

متن کامل

Key Generation Using an External Source of Excitation: Capacity, Reliability, and Secrecy Exponent

We study the fundamental limits to secret key generation from an excited distributed source (EDS). In an EDS a pair of terminals observe dependent sources of randomness excited by a pre-arranged signal. We first determine the secret key capacity for such systems with one-way public messaging. We then characterize a tradeoff between the secret key rate and exponential bounds on the probability o...

متن کامل

Secret Key Agreement by Soft-Decision of Signals in Gaussian Maurer's Model

SUMMARY We consider the problem of secret key agreement in Gaussian Maurer's Model. In Gaussian Maurer's model, legitimate receivers, Alice and Bob, and a wire-tapper, Eve, receive signals randomly generated by a satellite through three independent memoryless Gaussian channels respectively. Then Al-ice and Bob generate a common secret key from their received signals. In this model, we propose a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013