Secret-Key Agreement With Channel State Information at the Transmitter

IEEE Transactions on Information Forensics and Security(2011)

引用 63|浏览1
暂无评分
摘要
We study the capacity of secret-key agreement over a wiretap channel with state parameters. The transmitter, the legitimate receiver, and the eavesdropper are connected by a discrete memoryless wiretap channel with a memoryless state sequence. The transmitter and the legitimate receiver generate a secret-key that must be concealed from the eavesdropper. We assume that the state sequence is known noncausally to the transmitter and no public discussion channel is available. We derive lower and upper bounds on the secret-key capacity. The lower bound involves a source-channel codebook for constructing a common reconstruction sequence at the legitimate terminals and then mapping this sequence to a secret-key using a secret-key codebook. For the special case of Gaussian channels with additive interference (secret-keys from dirty paper channel) our bounds differ by 0.5 bit/symbol and coincide in the high signal-to-noise-ratio and high interference-to-noise-ratio regimes. In another special case-symmetric channel state information (CSI)-when the legitimate receiver is also revealed the state sequence, we establish optimality of our lower bound. In addition, only causal side information at the transmitter and the receiver suffices to attain the secret-key capacity in the case of symmetric CSI.
更多
查看译文
关键词
gaussian channels,channel capacity,channel coding,radio receivers,radio transmitters,radiofrequency interference,source coding,telecommunication security,wireless channels,gaussian channel,additive interference,case symmetric channel state information,causal side information,common reconstruction sequence,discrete memoryless wiretap channel,interference-to-noise-ratio,memoryless state sequence,public discussion channel,secret-key agreement capacity,secret-key codebook,signal-to-noise-ratio,source channel codebook,state sequence,channel reciprocity,channels with state parameters,fading channels,information-theoretic security,secret sharing,secret-key generation,wire-tap channels,signal to noise ratio,information theory,lower bound
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要