Secret key generation over noisy channels with common randomness

This paper investigates the problem of secret key generation over a wiretap channel when the terminals have access to correlated sources. These sources are independent of the main channel and the users observe them before the transmission takes place. A novel achievable scheme for this model is proposed and is shown to be optimal under certain less noisy conditions. This result improves upon the existing literature where the more stringent condition of degradedness was needed.

[1]  Camilla Hollanti,et al.  Physical Layer Security: A Paradigm Shift in Data Confidentiality , 2016 .

[2]  Haim H. Permuter,et al.  Wiretap channels with random states non-causally available at the encoder , 2016, 2016 IEEE International Conference on the Science of Electrical Engineering (ICSEE).

[3]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[4]  L. Goddard Information Theory , 1962, Nature.

[5]  Jun Muramatsu General formula for secrecy capacity of wiretap channel with noncausal state , 2014, 2014 IEEE International Symposium on Information Theory.

[6]  Thomas M. Cover,et al.  Network Information Theory , 2001 .

[7]  Thomas A. Courtade,et al.  Coded Cooperative Data Exchange for a Secret Key , 2014, IEEE Transactions on Information Theory.

[8]  Himanshu Tyagi,et al.  Secret Key Agreement: General Capacity and Second-Order Asymptotics , 2014, IEEE Transactions on Information Theory.

[9]  Haim H. Permuter,et al.  Semantic-security capacity for wiretap channels of type II , 2015, 2016 IEEE International Symposium on Information Theory (ISIT).

[10]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[11]  Abbas El Gamal,et al.  Network Information Theory , 2021, 2021 IEEE 3rd International Conference on Advanced Trends in Information Theory (ATIT).

[12]  Wei Liu,et al.  Wiretap Channel With Two-Sided Channel State Information , 2007, 2007 Conference Record of the Forty-First Asilomar Conference on Signals, Systems and Computers.

[13]  Sung Hoon Lim,et al.  Lossy communication of correlated sources over multiple access channels , 2010, 2010 48th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[14]  Mikael Skoglund,et al.  Key Agreement over a Generalized Multiple Access Channel Using Noiseless and Noisy Feedback , 2013, IEEE Journal on Selected Areas in Communications.

[15]  Vinod M. Prabhakaran,et al.  Secrecy via Sources and Channels , 2008, IEEE Transactions on Information Theory.

[16]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[17]  Sennur Ulukus,et al.  Secure lossy source coding with side information , 2011, 2011 49th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[18]  Imre Csiszár,et al.  Common randomness and secret key generation with a helper , 2000, IEEE Trans. Inf. Theory.

[19]  Bin Dai,et al.  Wiretap Channel With Side Information , 2006, ArXiv.

[20]  Shlomo Shamai,et al.  Secure Transmission of Sources Over Noisy Channels With Side Information at the Receivers , 2012, IEEE Transactions on Information Theory.

[21]  Sung Hoon Lim,et al.  A Unified Approach to Hybrid Coding , 2015, IEEE Transactions on Information Theory.

[22]  Chandra Nair Capacity regions of two new classes of 2-receiver broadcast channels , 2009, ISIT.

[23]  Himanshu Tyagi,et al.  Common Information and Secret Key Capacity , 2013, IEEE Transactions on Information Theory.

[24]  Matthieu R. Bloch,et al.  Physical-Layer Security: From Information Theory to Security Engineering , 2011 .

[25]  Tetsunao Matsuta,et al.  国際会議開催報告:2013 IEEE International Symposium on Information Theory , 2013 .

[26]  Shlomo Shamai,et al.  The wiretap channel with generalized feedback: Secure communication and key generation , 2015, 2015 IEEE Information Theory Workshop - Fall (ITW).

[27]  U. Maurer,et al.  Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.

[28]  Pablo Piantanida,et al.  The Gaussian wiretap channel with correlated sources at the terminals: Secret communication and key generation , 2016, 2016 IEEE International Conference on the Science of Electrical Engineering (ICSEE).

[29]  Ali Zibaeenejad Key Generation Over Wiretap Models With Non-Causal Side Information , 2015, IEEE Transactions on Information Forensics and Security.

[30]  Rudolf Ahlswede,et al.  Common randomness in information theory and cryptography - I: Secret sharing , 1993, IEEE Trans. Inf. Theory.

[31]  Suhas N. Diggavi,et al.  Secret-Key Agreement With Channel State Information at the Transmitter , 2010, IEEE Transactions on Information Forensics and Security.

[32]  Pablo Piantanida,et al.  Secure Multiterminal Source Coding With Side Information at the Eavesdropper , 2011, IEEE Transactions on Information Theory.

[33]  Suhas N. Diggavi,et al.  Secret-Key Generation Using Correlated Sources and Channels , 2009, IEEE Transactions on Information Theory.

[34]  Moritz Wiese,et al.  A Channel Under Simultaneous Jamming and Eavesdropping Attack—Correlated Random Coding Capacities Under Strong Secrecy Criteria , 2014, IEEE Transactions on Information Theory.

[35]  Carles Padró,et al.  Information Theoretic Security , 2013, Lecture Notes in Computer Science.