dc.contributor.author | Wornell, Gregory W. | |
dc.contributor.author | Khisti, Ashish | |
dc.contributor.author | Diggavi, Suhas N. | |
dc.date.accessioned | 2010-10-21T19:47:12Z | |
dc.date.available | 2010-10-21T19:47:12Z | |
dc.date.issued | 2009-04 | |
dc.date.submitted | 2009-06 | |
dc.identifier.isbn | 978-1-4244-4312-3 | |
dc.identifier.other | INSPEC Accession Number: 10842360 | |
dc.identifier.uri | http://hdl.handle.net/1721.1/59452 | |
dc.description.abstract | We study secret-key agreement protocols over a wiretap channel controlled by a state parameter. The secret-key capacity is established when the wiretap channel is discrete and memoryless, the sender and receiver are both revealed the underlying state parameter, and no public discussion is allowed. An optimal coding scheme involves a two step approach - (i) design a wiretap codebook assuming that the state parameter is also known to the eavesdropper (ii) generate an additional secret key by exploiting the uncertainty of the state parameter at the eavesdropper. When unlimited public discussion is allowed between the legitimate terminals, we provide an upper bound on the secret-key capacity and establish its tightness when the channel outputs of the legitimate receiver and eavesdropper satisfy a conditional independence property. Numerical results for an on-off fading model suggest that the proposed coding schemes significantly outperform naive schemes that either disregard the contribution of the common state sequence or the contribution of the underlying channel. | en_US |
dc.description.sponsorship | National Science Foundation (U.S.) (Grant No. CCF-0515109) | en_US |
dc.language.iso | en_US | |
dc.publisher | Institute of Electrical and Electronics Engineers | en_US |
dc.relation.isversionof | http://dx.doi.org/10.1109/ISIT.2009.5205906 | en_US |
dc.rights | Article is made available in accordance with the publisher's policy and may be subject to US copyright law. Please refer to the publisher's site for terms of use. | en_US |
dc.source | IEEE | en_US |
dc.title | Secret key agreement using asymmetry in channel state knowledge | en_US |
dc.type | Article | en_US |
dc.identifier.citation | Khisti, A., G. Wornell, and S. Diggavi. “Secret key agreement using asymmetry in channel state knowledge.” Information Theory, 2009. ISIT 2009. IEEE International Symposium on. 2009. 2286-2290. ©2009 Institute of Electrical and Electronics Engineers. | en_US |
dc.contributor.department | Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science | en_US |
dc.contributor.approver | Wornell, Gregory W. | |
dc.contributor.mitauthor | Wornell, Gregory W. | |
dc.relation.journal | IEEE International Symposium on Information Theory, 2009. ISIT 2009. | en_US |
dc.eprint.version | Final published version | en_US |
dc.type.uri | http://purl.org/eprint/type/JournalArticle | en_US |
eprint.status | http://purl.org/eprint/status/PeerReviewed | en_US |
dspace.orderedauthors | Khisti, Ashish; Diggavi, Suhas; Wornell, Gregory | en |
dc.identifier.orcid | https://orcid.org/0000-0001-9166-4758 | |
mit.license | PUBLISHER_POLICY | en_US |
mit.metadata.status | Complete | |