GLOBECOM 2020 - 2020 IEEE Global Communications Conference 2020
DOI: 10.1109/globecom42002.2020.9322460
|View full text |Cite
|
Sign up to set email alerts
|

Common Randomness Generation and Identification over Gaussian Channels

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
13
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
7

Relationship

3
4

Authors

Journals

citations
Cited by 16 publications
(13 citation statements)
references
References 16 publications
0
13
0
Order By: Relevance
“…In contrast to the discrete case in [2], [14], note that the CR capacity can reach infinity [24]. If the I(X, Y ) = +∞, then the single-letter characterization in ( 13) can be reduced to the following form:…”
Section: B Definitions and Main Resultsmentioning
confidence: 99%
See 3 more Smart Citations
“…In contrast to the discrete case in [2], [14], note that the CR capacity can reach infinity [24]. If the I(X, Y ) = +∞, then the single-letter characterization in ( 13) can be reduced to the following form:…”
Section: B Definitions and Main Resultsmentioning
confidence: 99%
“…CR capacity refers to the maximum rate of CR that Alice and Bob can generate using the resources available in the model. Later, the results on CR capacity have been extended in [14] to point-to-point single-input single-output (SISO) and Multiple-Input Multiple-Output (MIMO) Gaussian channels for their practical relevance in many communication situations such as wired and wireless communications, satellite and deep space communication links, etc. The results on CR capacity over Gaussian channels have been used to establish a lower-bound on their corresponding correlation-assisted secure identification capacity in the log-log scale [14].…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…In this setting, Eve is not required to obtain a public key, and she is viewed as a malicious party that tries to get a hold of Bob's secret key. On the other hand, taking R 1 = 0, we distill a public key without eavesdropping, which can be viewed as randomness concentration [4,93]. Nonetheless, we require the public communication to be independent of the distilled key.…”
Section: Conference Key Agreementmentioning
confidence: 99%