Show simple item record

dc.contributor.authorKhisti, Ashish
dc.contributor.authorDiggavi, Suhas N.
dc.contributor.authorWornell, Gregory W.
dc.date.accessioned2014-10-21T16:24:39Z
dc.date.available2014-10-21T16:24:39Z
dc.date.issued2012-02
dc.date.submitted2011-01
dc.identifier.issn0018-9448
dc.identifier.issn1557-9654
dc.identifier.urihttp://hdl.handle.net/1721.1/91045
dc.description.abstractWe study the secret-key capacity in a joint source-channel coding setup-the terminals are connected over a discrete memoryless channel and have access to side information, modelled as a pair of discrete memoryless source sequences. As our main result, we establish the upper and lower bounds on the secret-key capacity. In the lower bound expression, the equivocation terms of the source and channel components are functionally additive even though the coding scheme generates a single secret-key by jointly taking into account the source and channel equivocations. Our bounds coincide, thus establishing the capacity, when the underlying wiretap channel can be decomposed into a set of independent, parallel, and reversely degraded channels. For the case of parallel Gaussian channels and jointly Gaussian sources we show that Gaussian codebooks achieve the secret-key capacity. In addition, when the eavesdropper also observes a correlated side information sequence, we establish the secret-key capacity when both the source and channel of the eavesdropper are a degraded version of the legitimate receiver. We finally also treat the case when a public discussion channel is available, propose a separation based coding scheme, and establish its optimality when the channel output symbols of the legitimate receiver and eavesdropper are conditionally independent given the input.en_US
dc.description.sponsorshipNational Science Foundation (U.S.) (Grant CCF-0515109)en_US
dc.language.isoen_US
dc.publisherInstitute of Electrical and Electronics Engineers (IEEE)en_US
dc.relation.isversionofhttp://dx.doi.org/10.1109/tit.2011.2173629en_US
dc.rightsCreative Commons Attribution-Noncommercial-Share Alikeen_US
dc.rights.urihttp://creativecommons.org/licenses/by-nc-sa/4.0/en_US
dc.sourcearXiven_US
dc.titleSecret-Key Generation Using Correlated Sources and Channelsen_US
dc.typeArticleen_US
dc.identifier.citationKhisti, Ashish, Suhas N. Diggavi, and Gregory W. Wornell. “Secret-Key Generation Using Correlated Sources and Channels.” IEEE Trans. Inform. Theory 58, no. 2 (February 2012): 652–670.en_US
dc.contributor.departmentMassachusetts Institute of Technology. Department of Electrical Engineering and Computer Scienceen_US
dc.contributor.mitauthorWornell, Gregory W.en_US
dc.relation.journalIEEE Transactions on Information Theoryen_US
dc.eprint.versionOriginal manuscripten_US
dc.type.urihttp://purl.org/eprint/type/JournalArticleen_US
eprint.statushttp://purl.org/eprint/status/NonPeerRevieweden_US
dspace.orderedauthorsKhisti, Ashish; Diggavi, Suhas N.; Wornell, Gregory W.en_US
dc.identifier.orcidhttps://orcid.org/0000-0001-9166-4758
mit.licenseOPEN_ACCESS_POLICYen_US
mit.metadata.statusComplete


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record