The Secret Key Capacity of a Class of Noisy Channels with Correlated Sources
暂无分享,去创建一个
[1] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[2] Imre Csiszár,et al. Secrecy Capacities for Multiterminal Channel Models , 2005, IEEE Transactions on Information Theory.
[3] Himanshu Tyagi,et al. Secret Key Agreement: General Capacity and Second-Order Asymptotics , 2014, IEEE Transactions on Information Theory.
[4] Ali Zibaeenejad. Key Generation Over Wiretap Models With Non-Causal Side Information , 2015, IEEE Transactions on Information Forensics and Security.
[5] Imre Csiszár,et al. Secrecy Generation for Multiaccess Channel Models , 2013, IEEE Transactions on Information Theory.
[6] Camilla Hollanti,et al. Physical Layer Security: A Paradigm Shift in Data Confidentiality , 2016 .
[7] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[8] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[9] Vinod M. Prabhakaran,et al. Secrecy via Sources and Channels , 2008, IEEE Transactions on Information Theory.
[10] Pablo Piantanida,et al. Secret Key Generation over Noisy Channels with Correlated Sources , 2018 .
[11] Haim H. Permuter,et al. Wiretap channels with random states non-causally available at the encoder , 2016, 2016 IEEE International Conference on the Science of Electrical Engineering (ICSEE).
[12] Jun Muramatsu. General formula for secrecy capacity of wiretap channel with noncausal state , 2014, 2014 IEEE International Symposium on Information Theory.
[13] Suhas N. Diggavi,et al. Secret-Key Generation Using Correlated Sources and Channels , 2009, IEEE Transactions on Information Theory.
[14] Thomas M. Cover,et al. Network Information Theory , 2001 .
[15] Chandra Nair. Capacity regions of two new classes of 2-receiver broadcast channels , 2009, ISIT.
[16] Rudolf Ahlswede,et al. Common randomness in information theory and cryptography - I: Secret sharing , 1993, IEEE Trans. Inf. Theory.
[17] Shlomo Shamai,et al. The wiretap channel with generalized feedback: Secure communication and key generation , 2015, 2015 IEEE Information Theory Workshop - Fall (ITW).
[18] U. Maurer,et al. Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.
[19] Shlomo Shamai,et al. Secret key generation over noisy channels with common randomness , 2016, 2016 IEEE International Symposium on Information Theory (ISIT).
[20] Mikael Skoglund,et al. Key Agreement over a Generalized Multiple Access Channel Using Noiseless and Noisy Feedback , 2013, IEEE Journal on Selected Areas in Communications.
[21] Imre Csiszár,et al. Common randomness and secret key generation with a helper , 2000, IEEE Trans. Inf. Theory.
[22] Venkat Anantharam,et al. Information-Theoretic Key Agreement of Multiple Terminals—Part II: Channel Model , 2010, IEEE Transactions on Information Theory.
[23] Bin Dai,et al. Wiretap Channel With Side Information , 2006, ArXiv.
[24] Haim H. Permuter,et al. Key and Message Semantic-Security Over State-Dependent Channels , 2020, IEEE Transactions on Information Forensics and Security.
[25] Venkat Anantharam,et al. Information-Theoretic Key Agreement of Multiple Terminals—Part I , 2010, IEEE Transactions on Information Theory.
[26] Thomas A. Courtade,et al. Coded Cooperative Data Exchange for a Secret Key , 2014, IEEE Transactions on Information Theory.
[27] H. Vincent Poor,et al. On the Computability of the Secret Key Capacity under Rate Constraints , 2019, ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[28] Himanshu Tyagi,et al. Multiterminal Secrecy by Public Discussion , 2016, Found. Trends Commun. Inf. Theory.
[29] Marco Baldi,et al. Physical and Data-Link Security Techniques for Future Communication Systems , 2016 .
[30] Pablo Piantanida,et al. The Gaussian wiretap channel with correlated sources at the terminals: Secret communication and key generation , 2016, 2016 IEEE International Conference on the Science of Electrical Engineering (ICSEE).
[31] Wei Liu,et al. Wiretap Channel With Two-Sided Channel State Information , 2007, 2007 Conference Record of the Forty-First Asilomar Conference on Signals, Systems and Computers.
[32] Wei Kang,et al. Secret key generation from correlated sources and secure link , 2017, 2017 9th International Conference on Wireless Communications and Signal Processing (WCSP).
[33] Himanshu Tyagi,et al. Common Information and Secret Key Capacity , 2013, IEEE Transactions on Information Theory.