Secret-Key Generation Using Correlated Sources and Channels. Khisti, A, Diggavi, S., & Wornell, G. W. Information Theory, IEEE Transactions on, 58(2):652-670, Feb, 2012. doi abstract bibtex We study the secret-key capacity in a joint source-channel coding setup-the terminals are connected over a discrete memoryless channel and have access to side information, modelled as a pair of discrete memoryless source sequences. As our main result, we establish the upper and lower bounds on the secret-key capacity. In the lower bound expression, the equivocation terms of the source and channel components are functionally additive even though the coding scheme generates a single secret-key by jointly taking into account the source and channel equivocations. Our bounds coincide, thus establishing the capacity, when the underlying wiretap channel can be decomposed into a set of independent, parallel, and reversely degraded channels. For the case of parallel Gaussian channels and jointly Gaussian sources we show that Gaussian codebooks achieve the secret-key capacity. In addition, when the eavesdropper also observes a correlated side information sequence, we establish the secret-key capacity when both the source and channel of the eavesdropper are a degraded version of the legitimate receiver. We finally also treat the case when a public discussion channel is available, propose a separation based coding scheme, and establish its optimality when the channel output symbols of the legitimate receiver and eavesdropper are conditionally independent given the input.
@article{kdw_j11,
abstract = {We study the secret-key capacity in a joint source-channel coding setup-the terminals are connected over a discrete memoryless channel and have access to side information, modelled as a pair of discrete memoryless source sequences. As our main result, we establish the upper and lower bounds on the secret-key capacity. In the lower bound expression, the equivocation terms of the source and channel components are functionally additive even though the coding scheme generates a single secret-key by jointly taking into account the source and channel equivocations. Our bounds coincide, thus establishing the capacity, when the underlying wiretap channel can be decomposed into a set of independent, parallel, and reversely degraded channels. For the case of parallel Gaussian channels and jointly Gaussian sources we show that Gaussian codebooks achieve the secret-key capacity. In addition, when the eavesdropper also observes a correlated side information sequence, we establish the secret-key capacity when both the source and channel of the eavesdropper are a degraded version of the legitimate receiver. We finally also treat the case when a public discussion channel is available, propose a separation based coding scheme, and establish its optimality when the channel output symbols of the legitimate receiver and eavesdropper are conditionally independent given the input.},
author = {Khisti, A and Diggavi, S.N. and Wornell, Gregory W.},
doi = {10.1109/TIT.2011.2173629},
file = {:papers:secret_keygen.pdf},
issn = {0018-9448},
journal = {Information Theory, IEEE Transactions on},
label = {kdw_j11},
month = {Feb},
number = {2},
pages = {652-670},
tags = {journal,ITsecrecy,KeyGen,IT,WiNetSec,SrcChanSec},
title = {Secret-Key Generation Using Correlated Sources and Channels},
type = {2},
volume = {58},
year = {2012}
}
Downloads: 0
{"_id":"CPtkdrjv7q4TWirzW","bibbaseid":"khisti-diggavi-wornell-secretkeygenerationusingcorrelatedsourcesandchannels-2012","author_short":["Khisti, A","Diggavi, S.","Wornell, G. W."],"bibdata":{"bibtype":"article","type":"2","abstract":"We study the secret-key capacity in a joint source-channel coding setup-the terminals are connected over a discrete memoryless channel and have access to side information, modelled as a pair of discrete memoryless source sequences. As our main result, we establish the upper and lower bounds on the secret-key capacity. In the lower bound expression, the equivocation terms of the source and channel components are functionally additive even though the coding scheme generates a single secret-key by jointly taking into account the source and channel equivocations. Our bounds coincide, thus establishing the capacity, when the underlying wiretap channel can be decomposed into a set of independent, parallel, and reversely degraded channels. For the case of parallel Gaussian channels and jointly Gaussian sources we show that Gaussian codebooks achieve the secret-key capacity. In addition, when the eavesdropper also observes a correlated side information sequence, we establish the secret-key capacity when both the source and channel of the eavesdropper are a degraded version of the legitimate receiver. We finally also treat the case when a public discussion channel is available, propose a separation based coding scheme, and establish its optimality when the channel output symbols of the legitimate receiver and eavesdropper are conditionally independent given the input.","author":[{"propositions":[],"lastnames":["Khisti"],"firstnames":["A"],"suffixes":[]},{"propositions":[],"lastnames":["Diggavi"],"firstnames":["S.N."],"suffixes":[]},{"propositions":[],"lastnames":["Wornell"],"firstnames":["Gregory","W."],"suffixes":[]}],"doi":"10.1109/TIT.2011.2173629","file":":papers:secret_keygen.pdf","issn":"0018-9448","journal":"Information Theory, IEEE Transactions on","label":"kdw_j11","month":"Feb","number":"2","pages":"652-670","tags":"journal,ITsecrecy,KeyGen,IT,WiNetSec,SrcChanSec","title":"Secret-Key Generation Using Correlated Sources and Channels","volume":"58","year":"2012","bibtex":"@article{kdw_j11,\n abstract = {We study the secret-key capacity in a joint source-channel coding setup-the terminals are connected over a discrete memoryless channel and have access to side information, modelled as a pair of discrete memoryless source sequences. As our main result, we establish the upper and lower bounds on the secret-key capacity. In the lower bound expression, the equivocation terms of the source and channel components are functionally additive even though the coding scheme generates a single secret-key by jointly taking into account the source and channel equivocations. Our bounds coincide, thus establishing the capacity, when the underlying wiretap channel can be decomposed into a set of independent, parallel, and reversely degraded channels. For the case of parallel Gaussian channels and jointly Gaussian sources we show that Gaussian codebooks achieve the secret-key capacity. In addition, when the eavesdropper also observes a correlated side information sequence, we establish the secret-key capacity when both the source and channel of the eavesdropper are a degraded version of the legitimate receiver. We finally also treat the case when a public discussion channel is available, propose a separation based coding scheme, and establish its optimality when the channel output symbols of the legitimate receiver and eavesdropper are conditionally independent given the input.},\n author = {Khisti, A and Diggavi, S.N. and Wornell, Gregory W.},\n doi = {10.1109/TIT.2011.2173629},\n file = {:papers:secret_keygen.pdf},\n issn = {0018-9448},\n journal = {Information Theory, IEEE Transactions on},\n label = {kdw_j11},\n month = {Feb},\n number = {2},\n pages = {652-670},\n tags = {journal,ITsecrecy,KeyGen,IT,WiNetSec,SrcChanSec},\n title = {Secret-Key Generation Using Correlated Sources and Channels},\n type = {2},\n volume = {58},\n year = {2012}\n}\n\n","author_short":["Khisti, A","Diggavi, S.","Wornell, G. W."],"key":"kdw_j11","id":"kdw_j11","bibbaseid":"khisti-diggavi-wornell-secretkeygenerationusingcorrelatedsourcesandchannels-2012","role":"author","urls":{},"metadata":{"authorlinks":{}},"html":""},"bibtype":"article","biburl":"https://bibbase.org/network/files/e2kjGxYgtBo8SWSbC","dataSources":["hicKnsKYNEFXC4CgH","jxCYzXXYRqw2fiEXQ","wCByFFrQMyRwfzrJ6","yuqM5ah4HMsTyDrMa","YaM87hGQiepg5qijZ","n9wmfkt5w8CPqCepg","soj2cS6PgG8NPmWGr","FaDBDiyFAJY5pL28h","ycfdiwWPzC2rE6H77"],"keywords":[],"search_terms":["secret","key","generation","using","correlated","sources","channels","khisti","diggavi","wornell"],"title":"Secret-Key Generation Using Correlated Sources and Channels","year":2012}