2014
DOI: 10.1109/tit.2014.2313566
|View full text |Cite
|
Sign up to set email alerts
|

Multiterminal Secret Key Agreement

Abstract: We consider the secret key agreement problem under the multiterminal source model proposed by Csiszár and Narayan. A single-letter characterization of the secrecy capacity is desired but remains unknown except in the extreme case with unlimited public discussion and without wiretapper's side information. Taking the problem to the opposite extreme by requiring the public discussion rate to be zero asymptotically, we obtain the desired characterization under surprisingly general setting with wiretapper's side in… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
6
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
4
3

Relationship

2
5

Authors

Journals

citations
Cited by 15 publications
(7 citation statements)
references
References 46 publications
1
6
0
Order By: Relevance
“…In particular, à ðfigÞ > 0 for all i 2 V. By the complementary slackness theorem, we have r à i ¼ HðZ i jZ Vnfig Þ for any optimal r à V to the primal LP and so IðZ V Þ ¼ HðZ V Þ À r à ðVÞ ¼ J D ðZ V Þ. 20 This implies (6.12f) because of (6.8).…”
Section: Bounds and Tightness Conditionsmentioning
confidence: 83%
See 2 more Smart Citations
“…In particular, à ðfigÞ > 0 for all i 2 V. By the complementary slackness theorem, we have r à i ¼ HðZ i jZ Vnfig Þ for any optimal r à V to the primal LP and so IðZ V Þ ¼ HðZ V Þ À r à ðVÞ ¼ J D ðZ V Þ. 20 This implies (6.12f) because of (6.8).…”
Section: Bounds and Tightness Conditionsmentioning
confidence: 83%
“…Equation (6.12b) may not imply (6.12a) in the bivariate case. 20 Indeed, (6.12f) is stronger than necessary. Suppose we have a set of optimal solutions to the dual linear program and put their supports in S. Repeatedly for every overlapping S 1 ; S 2 2 S such that S 1 [ S 2 6 ¼ V, add S 1 \ S 2 to S. It can be argued using the submodularity of entropy that, for all S 2 S, r à ðSÞ ¼ HðZ S jZ VnS Þ for all optimal r à V to the primal LP.…”
Section: Bounds and Tightness Conditionsmentioning
confidence: 98%
See 1 more Smart Citation
“…The idea is to compute the empirical entropies of subsets of random variables Z B after quantization, and use them in (3.3a) to estimate the MMI. The MMI of the quantized random variables is shown to approach the MMI of the continuous random variables in [91,Appendix B], and the details of the quantization can be found therein. However, computing the empirical joint distribution of a subset of random variables or estimating the joint entropy from the data samples takes exponential time with respect to the size of the subset [98].…”
Section: A Gene Cluseringmentioning
confidence: 99%
“…The supremum of all achievable key rates is called the source model secretkey (SK) capacity and denoted by S(X; Y Z). Extensions to multiple parties and continuous random variables can be found in [4][5][6][7][8][9].…”
Section: Introductionmentioning
confidence: 99%