2010
DOI: 10.1587/transfun.e93.a.1976
|View full text |Cite
|
Sign up to set email alerts
|

Secret Key Agreement from Correlated Gaussian Sources by Rate Limited Public Communication

Abstract: SUMMARYWe investigate the secret key agreement from correlated Gaussian sources in which the legitimate parties can use the public communication with limited rate. For the class of protocols with the one-way public communication, we show a closed form expression of the optimal trade-off between the rate of key generation and the rate of the public communication. Our results clarify an essential difference between the key agreement from discrete sources and that from continuous sources.

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
67
0

Year Published

2010
2010
2020
2020

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 41 publications
(72 citation statements)
references
References 28 publications
2
67
0
Order By: Relevance
“…These types of attacks are known as side channel attacks [88]. They are performed by observing the electromagnetic radiations, power consumption, or the timing behavior of an embedded device.…”
Section: Physical Layer Key Generation Schemesmentioning
confidence: 99%
See 1 more Smart Citation
“…These types of attacks are known as side channel attacks [88]. They are performed by observing the electromagnetic radiations, power consumption, or the timing behavior of an embedded device.…”
Section: Physical Layer Key Generation Schemesmentioning
confidence: 99%
“…Physical layer key generation scheme has gained significant attention in recent years due to its lightweight and information theoretic security features [88,[91][92][93][94][95][96][97][98][99].…”
Section: Physical Layer Key Generation Schemesmentioning
confidence: 99%
“…It is shown in [5][6] that the secret key rate is limited by the public channel capacity for Gaussian sources. The upper bound can be achieved only when the communication rate is unlimited.…”
Section: System Modelmentioning
confidence: 99%
“…Proof: Given signal vectors and at nodes and , respectively, let be the size of the secret key per signal sample that can be generated under the constraint that is the maximum number of bits that can be exchanged per signal sample between nodes and . Using [28] and [29], 7 for large , and are related as follows:…”
Section: : Best Lower Boundmentioning
confidence: 99%
“…The ratio in (27) can be computed as follows. Lemma 4: For the general quantization scheme as given in (16), expression (27) can be evaluated as follows: (28) where is given as…”
Section: Active Adversary With Channel Estimationmentioning
confidence: 99%