Next Article in Journal
Altered Causal Coupling Pathways within the Central-Autonomic-Network in Patients Suffering from Schizophrenia
Next Article in Special Issue
Anomalies Detection and Proactive Defence of Routers Based on Multiple Information Learning
Previous Article in Journal
Generalized Master Equation Approach to Time-Dependent Many-Body Transport
Previous Article in Special Issue
A Security Enhanced Encryption Scheme and Evaluation of Its Cryptographic Security
Open AccessArticle

The Secret Key Capacity of a Class of Noisy Channels with Correlated Sources

1
School of Electrical Engineering and Computer Science, KTH Royal Institute of Technology, 100 44 Stockholm, Sweden
2
CentraleSupélec–French National Center for Scientific Research (CNRS)–Université Paris-Sud, 3 Rue Joliot-Curie, F-91192 Gif-sur-Yvette, France
3
Montreal Institute for Learning Algorithms (MILA), Université de Montréal, 2920 Chemin de la Tour, Montréal, QC H3T 1N8, Canada
4
Department of Electrical Engineering, Technion–Israel Institute of Technology, Haifa 32000, Israel
*
Author to whom correspondence should be addressed.
Entropy 2019, 21(8), 732; https://doi.org/10.3390/e21080732
Received: 3 June 2019 / Revised: 24 July 2019 / Accepted: 25 July 2019 / Published: 26 July 2019
(This article belongs to the Special Issue Information-Theoretic Security II)
This paper investigates the problem of secret key generation over a wiretap channel when the terminals observe correlated sources. These sources are independent of the main channel and the users overhear them before the transmission takes place. A novel outer bound is proposed and, employing a previously reported inner bound, the secret key capacity is derived under certain less-noisy conditions on the channel or source components. This result improves upon the existing literature where the more stringent condition of degradedness is required. Furthermore, numerical evaluation of the achievable scheme and previously reported results for a binary model are presented; a comparison of the numerical bounds provides insights on the benefit of the chosen scheme. View Full-Text
Keywords: information-theoretic security; secret key agreement; secret key capacity; wiretap channel; correlated sources information-theoretic security; secret key agreement; secret key capacity; wiretap channel; correlated sources
Show Figures

Figure 1

MDPI and ACS Style

Bassi, G.; Piantanida, P.; Shamai (Shitz), S. The Secret Key Capacity of a Class of Noisy Channels with Correlated Sources. Entropy 2019, 21, 732.

Show more citation formats Show less citations formats
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map

1
Back to TopTop