Secret Key Capacity For Multipleaccess Channel With Public Feedback

02/24/2019
by   Himanshu Tyagi, et al.
0

We consider the generation of a secret key (SK) by the inputs and the output of a secure multipleaccess channel (MAC) that additionally have access to a noiseless public communication channel. Under specific restrictions on the protocols, we derive various upper bounds on the rate of such SKs. Specifically, if the public communication consists of only the feedback from the output terminal, then the rate of SKs that can be generated is bounded above by the maximum symmetric rate R_f^∗ in the capacity region of the MAC with feedback. On the other hand, if the public communication is allowed only before and after the transmission over the MAC, then the rate of SKs is bounded above by the maximum symmetric rate R^∗ in the capacity region of the MAC without feedback. Furthermore, for a symmetric MAC, we present a scheme that generates an SK of rate R_f^∗, improving the best previously known achievable rate R^∗. An application of our results establishes the SK capacity for adder MAC, without any restriction on the protocols.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
05/03/2018

Upper Bounds via Lamination on the Constrained Secrecy Capacity of Hypergraphical Sources

Hypergraphical sources are a natural class of sources for secret key gen...
research
08/07/2020

A Channel Model of Transceivers for Multiterminal Secret Key Agreement

Information theoretic secret key agreement is impossible without making ...
research
05/08/2021

Distortion-Based Outer-Bounds for Channels with Rate-Limited Feedback

We present a new technique to obtain outer-bounds on the capacity region...
research
01/11/2018

Noisy Feedback and Loss Unlimited Private Communication

Alice is transmitting a private message to Bob across a bosonic wiretap ...
research
04/09/2020

Secret Key Generation from Vector Gaussian Sources with Public and Private Communications

In this paper, we consider the problem of secret key generation with one...
research
04/23/2018

On capacities of the two-user union channel with complete feedback

The exact values of the optimal symmetric rate point in the Cover--Leung...
research
09/13/2020

Secret key distillation over realistic satellite-to-satellite free-space channel: exclusion zone analysis

Quantum cryptography studies the unconditional information security agai...

Please sign up or login with your details

Forgot password? Click here to reset