Secret Key Agreement by Soft-Decision of Signals in Gaussian Maurer's Model
نویسندگان
چکیده
SUMMARY We consider the problem of secret key agreement in Gaussian Maurer's Model. In Gaussian Maurer's model, legitimate receivers, Alice and Bob, and a wire-tapper, Eve, receive signals randomly generated by a satellite through three independent memoryless Gaussian channels respectively. Then Al-ice and Bob generate a common secret key from their received signals. In this model, we propose a protocol for generating a common secret key by using the result of soft-decision of Alice and Bob's received signals. Then, we calculate a lower bound on the secret key rate in our proposed protocol. As a result of comparison with the protocol that only uses hard-decision, we found that the higher rate is obtained by using our protocol.
منابع مشابه
Group Generalized Interval-valued Intuitionistic Fuzzy Soft Sets and Their Applications in\ Decision Making
Interval-valued intuitionistic fuzzy sets (IVIFSs) are widely used to handle uncertainty and imprecision in decision making. However, in more complicated environment, it is difficult to express the uncertain information by an IVIFS with considering the decision-making preference. Hence, this paper proposes a group generalized interval-valued intuitionistic fuzzy soft set (G-GIVIFSS) which conta...
متن کاملSecret Key Agreement from Correlated Gaussian Sources by Rate Limited Public Communication
We investigate the secret key agreement from correlated Gaussian sources in which the legitimate parties can use the public communication with limited rate. For the class of protocols with the one-way public communication, we show a closed form expression of the optimal trade-off between the rate of key generation and the rate of the public communication. Our results clarify an essential differ...
متن کاملOptimal SVD-based Precoding for Secret Key Extraction from Correlated OFDM Sub-Channels
Secret key extraction is a crucial issue in physical layer security and a less complex and, at the same time, a more robust scheme for the next generation of 5G and beyond. Unlike previous works on this topic, in which Orthogonal Frequency Division Multiplexing (OFDM) sub-channels were considered to be independent, the effect of correlation between sub-channels on the secret key rate is address...
متن کاملLDPC-BASED SECRET-SHARING SCHEMES FOR WIRETAP CHANNELS By CHAN WONG WONG A DISSERTATION PRESENTED TO THE GRADUATE SCHOOL OF THE UNIVERSITY OF FLORIDA IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF DOCTOR OF PHILOSOPHY
of Dissertation Presented to the Graduate School of the University of Florida in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy LDPC-BASED SECRET-SHARING SCHEMES FOR WIRETAP CHANNELS By Chan Wong Wong December 2011 Chair: John M. Shea Cochair: Tan F. Wong Major: Electrical and Computer Engineering This dissertation examines the practical design of secret-sharing ...
متن کاملSecret-Sharing over Correlated Fast-Fading Multiple-Antenna Channels with Public Discussion
We consider secret-key agreement with public discussion over multiple-input multiple-output (MIMO) Rayleigh fast-fading channels under correlated environment. We assume that transmit, legitimate receiver and eavesdropper antennas are correlated. The legitimate receiver and the eavesdropper are assumed to have perfect channel knowledge while the transmitter has only knowledge of the correlation ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IEICE Transactions
دوره 92-A شماره
صفحات -
تاریخ انتشار 2009