Show simple item record

dc.contributor.authorZhou, Hongchao
dc.contributor.authorChandar, Venkat B.
dc.contributor.authorWornell, Gregory W.
dc.date.accessioned2014-10-21T17:47:58Z
dc.date.available2014-10-21T17:47:58Z
dc.date.issued2013-07
dc.identifier.isbn978-1-4799-0446-4
dc.identifier.issn2157-8095
dc.identifier.urihttp://hdl.handle.net/1721.1/91131
dc.description.abstractSecret key extraction, the task of extracting a secret key from shared information that is partially known by an eavesdropper, has important applications in cryptography. Motivated by the requirements of high-speed quantum key distribution, we study secret-key extraction methods with simple and efficient hardware implementations, in particular, linear transformations based on low-density random matrices. We show that this method can achieve the information-theoretic upper bound (conditional Shannon entropy) on efficiency for a wide range of key-distribution systems. In addition, we introduce a numerical method that allows us to tightly estimate the quality of the generated secret key in the regime of finite block length, and use this method to demonstrate that low-density random matrices achieve very high performance for secret key extraction.en_US
dc.description.sponsorshipUnited States. Air Force Office of Scientific Research (Grant FA9550-11-1-0183)en_US
dc.description.sponsorshipUnited States. Defense Advanced Research Projects Agency. Information in a Photon (InPho) Program (Contract HR0011-10-C-0159)en_US
dc.language.isoen_US
dc.publisherInstitute of Electrical and Electronics Engineers (IEEE)en_US
dc.relation.isversionofhttp://dx.doi.org/10.1109/ISIT.2013.6620698en_US
dc.rightsCreative Commons Attribution-Noncommercial-Share Alikeen_US
dc.rights.urihttp://creativecommons.org/licenses/by-nc-sa/4.0/en_US
dc.sourceMIT web domainen_US
dc.titleLow-density random matrices for secret key extractionen_US
dc.typeArticleen_US
dc.identifier.citationZhou, Hongchao, Venkat Chandar, and Gregory Wornell. “Low-Density Random Matrices for Secret Key Extraction.” 2013 IEEE International Symposium on Information Theory (July 2013).en_US
dc.contributor.departmentLincoln Laboratoryen_US
dc.contributor.departmentMassachusetts Institute of Technology. Department of Electrical Engineering and Computer Scienceen_US
dc.contributor.departmentMassachusetts Institute of Technology. Research Laboratory of Electronicsen_US
dc.contributor.mitauthorZhou, Hongchaoen_US
dc.contributor.mitauthorChandar, Venkat B.en_US
dc.contributor.mitauthorWornell, Gregory W.en_US
dc.relation.journalProceedings of the 2013 IEEE International Symposium on Information Theoryen_US
dc.eprint.versionAuthor's final manuscripten_US
dc.type.urihttp://purl.org/eprint/type/ConferencePaperen_US
eprint.statushttp://purl.org/eprint/status/NonPeerRevieweden_US
dspace.orderedauthorsZhou, Hongchao; Chandar, Venkat; Wornell, Gregoryen_US
dc.identifier.orcidhttps://orcid.org/0000-0001-9166-4758
dspace.mitauthor.errortrue
mit.licenseOPEN_ACCESS_POLICYen_US
mit.metadata.statusComplete


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record