Secret Key Generation from Vector Gaussian Sources with Public and Private Communications

04/09/2020
by   Yinfei Xu, et al.
0

In this paper, we consider the problem of secret key generation with one-way communication through both a rate-limited public channel and a rate-limited secure channels where the public channel is from Alice to Bob and Eve and the secure channel is from Alice to Bob. In this model, we do not pose any constraints on the sources, i.e. Bob is not degraded to or less noisy than Eve. We obtain the optimal secret key rate in this problem, both for the discrete memoryless sources and vector Gaussian sources. The vector Gaussian characterization is derived by suitably applying the enhancement argument, and Proving a new extremal inequality. The extremal inequality can be seen as coupling of two extremal inequalities, which are related to the degraded compound MIMO Gaussian broadcast channel, and the vector generalization of Costa's entropy power inequality, accordingly.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
09/01/2021

New Proofs of Extremal Inequalities With Applications

The extremal inequality approach plays a key role in network information...
research
10/15/2020

Secret Sharing from Correlated Gaussian Random Variables and Public Communication

In this paper, we study a secret sharing problem, where a dealer distrib...
research
11/24/2019

Secure Sketch for All Noisy Sources

Secure sketch produces public information of its input w without reveali...
research
02/24/2019

Secret Key Capacity For Multipleaccess Channel With Public Feedback

We consider the generation of a secret key (SK) by the inputs and the ou...
research
06/21/2022

Secret key generation from Gaussian sources using lattice-based extractors

We propose a lattice-based scheme for secret key generation from Gaussia...
research
02/02/2020

The Gaussian lossy Gray-Wyner network

We consider the problem of source coding subject to a fidelity criterion...
research
10/28/2020

On the Failure of the Smart Approach of the GPT Cryptosystem

This paper describes a new algorithm for breaking the smart approach of ...

Please sign up or login with your details

Forgot password? Click here to reset