| dc.contributor.author | Khisti, Ashish | |
| dc.contributor.author | Diggavi, Suhas N. | |
| dc.contributor.author | Wornell, Gregory W. | |
| dc.date.accessioned | 2014-10-21T16:24:39Z | |
| dc.date.available | 2014-10-21T16:24:39Z | |
| dc.date.issued | 2012-02 | |
| dc.date.submitted | 2011-01 | |
| dc.identifier.issn | 0018-9448 | |
| dc.identifier.issn | 1557-9654 | |
| dc.identifier.uri | http://hdl.handle.net/1721.1/91045 | |
| dc.description.abstract | We study the secret-key capacity in a joint source-channel coding setup-the terminals are connected over a discrete memoryless channel and have access to side information, modelled as a pair of discrete memoryless source sequences. As our main result, we establish the upper and lower bounds on the secret-key capacity. In the lower bound expression, the equivocation terms of the source and channel components are functionally additive even though the coding scheme generates a single secret-key by jointly taking into account the source and channel equivocations. Our bounds coincide, thus establishing the capacity, when the underlying wiretap channel can be decomposed into a set of independent, parallel, and reversely degraded channels. For the case of parallel Gaussian channels and jointly Gaussian sources we show that Gaussian codebooks achieve the secret-key capacity. In addition, when the eavesdropper also observes a correlated side information sequence, we establish the secret-key capacity when both the source and channel of the eavesdropper are a degraded version of the legitimate receiver. We finally also treat the case when a public discussion channel is available, propose a separation based coding scheme, and establish its optimality when the channel output symbols of the legitimate receiver and eavesdropper are conditionally independent given the input. | en_US |
| dc.description.sponsorship | National Science Foundation (U.S.) (Grant CCF-0515109) | en_US |
| dc.language.iso | en_US | |
| dc.publisher | Institute of Electrical and Electronics Engineers (IEEE) | en_US |
| dc.relation.isversionof | http://dx.doi.org/10.1109/tit.2011.2173629 | en_US |
| dc.rights | Creative Commons Attribution-Noncommercial-Share Alike | en_US |
| dc.rights.uri | http://creativecommons.org/licenses/by-nc-sa/4.0/ | en_US |
| dc.source | arXiv | en_US |
| dc.title | Secret-Key Generation Using Correlated Sources and Channels | en_US |
| dc.type | Article | en_US |
| dc.identifier.citation | Khisti, Ashish, Suhas N. Diggavi, and Gregory W. Wornell. “Secret-Key Generation Using Correlated Sources and Channels.” IEEE Trans. Inform. Theory 58, no. 2 (February 2012): 652–670. | en_US |
| dc.contributor.department | Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science | en_US |
| dc.contributor.mitauthor | Wornell, Gregory W. | en_US |
| dc.relation.journal | IEEE Transactions on Information Theory | en_US |
| dc.eprint.version | Original manuscript | en_US |
| dc.type.uri | http://purl.org/eprint/type/JournalArticle | en_US |
| eprint.status | http://purl.org/eprint/status/NonPeerReviewed | en_US |
| dspace.orderedauthors | Khisti, Ashish; Diggavi, Suhas N.; Wornell, Gregory W. | en_US |
| dc.identifier.orcid | https://orcid.org/0000-0001-9166-4758 | |
| mit.license | OPEN_ACCESS_POLICY | en_US |
| mit.metadata.status | Complete | |