Secret key generation from Gaussian sources using lattices
نویسندگان
چکیده
We propose a simple lattice-based scheme for secret key generation from Gaussian sources in the presence of an eavesdropper, and show that we achieve strong secret key rates up to 1/2 nat from the optimal in the case of degraded source models. Our scheme is based on the notion of flatness factor, and does not require dithering.
منابع مشابه
Secret Key Agreement from Correlated Gaussian Sources by Rate Limited Public Communication
We investigate the secret key agreement from correlated Gaussian sources in which the legitimate parties can use the public communication with limited rate. For the class of protocols with the one-way public communication, we show a closed form expression of the optimal trade-off between the rate of key generation and the rate of the public communication. Our results clarify an essential differ...
متن کاملLattice Codes for Secure Communication and Secret Key Generation
In this work, we study two problems in information-theoretic security. Firstly, we study a wireless network where two nodes want to securely exchange messages via an honestbut-curious bidirectional relay. There is no direct link between the user nodes, and all communication must take place through the relay. The relay behaves like a passive eavesdropper, but otherwise follows the protocol it is...
متن کاملLower bounds of shortest vector lengths in random knapsack lattices and random NTRU lattices
Finding the shortest vector of a lattice is one of the most important problems in computational lattice theory. For a random lattice, one can estimate the length of the shortest vector using the Gaussian heuristic. However, no rigorous proof can be provided for some classes of lattices, as the Gaussian heuristic may not hold for them. In the paper we study two types of random lattices in crypto...
متن کاملKey Generation Using an External Source of Excitation: Capacity, Reliability, and Secrecy Exponent
We study the fundamental limits to secret key generation from an excited distributed source (EDS). In an EDS a pair of terminals observe dependent sources of randomness excited by a pre-arranged signal. We first determine the secret key capacity for such systems with one-way public messaging. We then characterize a tradeoff between the secret key rate and exponential bounds on the probability o...
متن کاملSecret Key Agreement by Soft-Decision of Signals in Gaussian Maurer's Model
SUMMARY We consider the problem of secret key agreement in Gaussian Maurer's Model. In Gaussian Maurer's model, legitimate receivers, Alice and Bob, and a wire-tapper, Eve, receive signals randomly generated by a satellite through three independent memoryless Gaussian channels respectively. Then Al-ice and Bob generate a common secret key from their received signals. In this model, we propose a...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013