The Gaussian wiretap channel with correlated sources at the terminals: Secret communication and key generation

This paper considers the setup of Alice, Bob and Eve sharing a Gaussian Broadcast channel, and correlated Gaussian sources, assuming these are independent of the channel components. Both secret key generation and secret message transmission are considered. A closed form expression is presented characterizing the optimal trade-off between the secret key and the secret message rates. A few known results are shown to be accepted as special cases.

[1]  A. J. Han Vinck,et al.  An achievable region for the Gaussian wiretap channel with side information , 2006, IEEE Transactions on Information Theory.

[2]  Wei Liu,et al.  Wiretap Channel With Two-Sided Channel State Information , 2007, 2007 Conference Record of the Forty-First Asilomar Conference on Signals, Systems and Computers.

[3]  Rudolf Ahlswede,et al.  Common randomness in information theory and cryptography - I: Secret sharing , 1993, IEEE Trans. Inf. Theory.

[4]  Suhas N. Diggavi,et al.  Secret-Key Agreement With Channel State Information at the Transmitter , 2010, IEEE Transactions on Information Forensics and Security.

[5]  Ashish Khisti Secret key agreement on wiretap channel with transmitter side information , 2010, 2010 European Wireless Conference (EW).

[6]  Yuan Luo,et al.  Some New Results on the Wiretap Channel with Side Information , 2012, Entropy.

[7]  Suhas N. Diggavi,et al.  Secret-key generation with correlated sources and noisy channels , 2008, 2008 IEEE International Symposium on Information Theory.

[8]  Shun Watanabe,et al.  Secret Key Agreement From Vector Gaussian Sources by Rate Limited Public Communication , 2010, IEEE Transactions on Information Forensics and Security.

[9]  Martin E. Hellman,et al.  The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.

[10]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[11]  Vinod M. Prabhakaran,et al.  Secrecy via Sources and Channels , 2008, IEEE Transactions on Information Theory.

[12]  I. Csiszár,et al.  Common randomness and secret key generation with a helper , 1997, Proceedings of the 1999 IEEE Information Theory and Communications Workshop (Cat. No. 99EX253).

[13]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[14]  Suhas N. Diggavi,et al.  Secret-Key Generation Using Correlated Sources and Channels , 2009, IEEE Transactions on Information Theory.

[15]  Aydin Sezgin,et al.  Wiretap Channel with Correlated Sources , 2014, 2014 IEEE International Conference on Cloud Engineering.

[16]  Aydin Sezgin,et al.  Gaussian wiretap channels with correlated sources: Approaching capacity region within a constant gap , 2014, 2014 IEEE International Conference on Communications Workshops (ICC).

[17]  K. Ramchandran,et al.  Secret communication using sources and channels , 2008, 2008 42nd Asilomar Conference on Signals, Systems and Computers.

[18]  V. Prabhakaran A Separation Result for Secure Communication , 2007 .

[19]  A. J. Han Vinck,et al.  Wiretap Channel With Side Information , 2006, IEEE Transactions on Information Theory.

[20]  Ali Zibaeenejad Key Generation Over Wiretap Models With Non-Causal Side Information , 2015, IEEE Transactions on Information Forensics and Security.

[21]  Vinod M. Prabhakaran,et al.  Secrecy via sources and channels — A secret key - Secret message rate tradeoff region , 2008, 2008 IEEE International Symposium on Information Theory.

[22]  Jun Muramatsu General formula for secrecy capacity of wiretap channel with noncausal state , 2014, 2014 IEEE International Symposium on Information Theory.

[23]  Shun Watanabe,et al.  Secret Key Agreement from Correlated Gaussian Sources by Rate Limited Public Communication , 2010, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..