메뉴 건너뛰기




Volumn 58, Issue 2, 2012, Pages 652-670

Secret-key generation using correlated sources and channels

Author keywords

Information theoretic security; Joint sourcechannel coding; Public discussion; Secret key agreement; Wiretap channel

Indexed keywords

INFORMATION-THEORETIC SECURITY; JOINT SOURCE-CHANNEL CODING; PUBLIC DISCUSSION; SECRET-KEY AGREEMENT; WIRETAP CHANNEL;

EID: 84856821725     PISSN: 00189448     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIT.2011.2173629     Document Type: Article
Times cited : (57)

References (32)
  • 1
    • 0027629488 scopus 로고
    • Common randomness in information theory and cryptography-Part I: Secret sharing
    • Jul.
    • R. Ahlswede and I. Csiszár, "Common randomness in information theory and cryptography-Part I: Secret sharing," IEEE Trans. Inf. Theory, vol. 39, pp. 1121-1132, Jul. 1993.
    • (1993) IEEE Trans. Inf. Theory , vol.39 , pp. 1121-1132
    • Ahlswede, R.1    Csiszár, I.2
  • 2
    • 0016037985 scopus 로고
    • A simple converse for broadcast channels with additive white Gaussian noise (corresp.)
    • P. Bergmans, "A simple converse for broadcast channels with additive white Gaussian noise (corresp.)," IEEE Trans. Inf. Theory, vol. 20, pp. 279-280, 1974.
    • (1974) IEEE Trans. Inf. Theory , vol.20 , pp. 279-280
    • Bergmans, P.1
  • 6
    • 33750056552 scopus 로고    scopus 로고
    • Almost independence and secrecy capacity (in russian)
    • I. Csiszár, "Almost independence and secrecy capacity (in russian)," Probl. Inf. Transmiss., vol. 32, pp. 48-57, 1996.
    • (1996) Probl. Inf. Transmiss. , vol.32 , pp. 48-57
    • Csiszár, I.1
  • 7
    • 0017973511 scopus 로고
    • Broadcast channels with confidential messages
    • Mar.
    • I. Csiszár and J. Körner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. 24, pp. 339-348, Mar. 1978.
    • (1978) IEEE Trans. Inf. Theory , vol.24 , pp. 339-348
    • Csiszár, I.1    Körner, J.2
  • 9
    • 0033891095 scopus 로고    scopus 로고
    • Common randomness and secret-key generation with a helper
    • Mar.
    • I. Csiszár and P. Narayan, "Common randomness and secret-key generation with a helper," IEEE Trans. Inf. Theory, vol. 46, pp. 344-366, Mar. 2000.
    • (2000) IEEE Trans. Inf. Theory , vol.46 , pp. 344-366
    • Csiszár, I.1    Narayan, P.2
  • 10
    • 10644270917 scopus 로고    scopus 로고
    • Secrecy capacities for multiple terminals
    • I. Csiszár and P. Narayan, "Secrecy capacities for multiple terminals," IEEE Trans. Inf. Theory, vol. 50, pp. 3047-3061, 2004.
    • (2004) IEEE Trans. Inf. Theory , vol.50 , pp. 3047-3061
    • Csiszár, I.1    Narayan, P.2
  • 11
    • 84888076958 scopus 로고    scopus 로고
    • The secrecy capacity region of the Gaussian MIMO multi-receiver wiretap channel
    • submitted for publication
    • E. Ekrem and S. Ulukus, "The secrecy capacity region of the Gaussian MIMO multi-receiver wiretap channel," IEEE Trans. Inf. Theory, submitted for publication.
    • IEEE Trans. Inf. Theory
    • Ekrem, E.1    Ulukus, S.2
  • 12
    • 0003179124 scopus 로고
    • Capacity of the product and sum of two un-matched broadcast channels
    • Jan.-Mar.
    • A. A. E. Gamal, "Capacity of the product and sum of two un-matched broadcast channels," Probl. Inf. Transmiss., pp. 3-23, Jan.-Mar. 1980.
    • (1980) Probl. Inf. Transmiss. , pp. 3-23
    • Gamal, A.A.E.1
  • 14
    • 77954600460 scopus 로고    scopus 로고
    • Information-theoretic key agreement of multiple terminals-Part I
    • Jun.
    • A. Gohari and V. Anantharam, "Information-theoretic key agreement of multiple terminals-Part I," IEEE Trans. Inf. Theory, vol. 56, pp. 3973-3996, Jun. 2010.
    • (2010) IEEE Trans. Inf. Theory , vol.56 , pp. 3973-3996
    • Gohari, A.1    Anantharam, V.2
  • 16
    • 77952701255 scopus 로고    scopus 로고
    • Secure degrees of freedom for Gaussian channels with interference: Structured codes outperform Gaussian signaling
    • submitted for publication
    • X. He and A. Yener, "Secure degrees of freedom for Gaussian channels with interference: Structured codes outperform Gaussian signaling," IEEE Trans. Inf. Theory, submitted for publication.
    • IEEE Trans. Inf. Theory
    • He, X.1    Yener, A.2
  • 18
    • 52349090484 scopus 로고    scopus 로고
    • Secret key generation using correlated sources and noisy channels
    • Toronto, Canada, Jun.
    • A. Khisti, S. N. Diggavi, and G. W. Wornell, "Secret key generation using correlated sources and noisy channels," in Proc. Int. Symp. Inf. Theory, Toronto, Canada, Jun. 2008.
    • (2008) Proc. Int. Symp. Inf. Theory
    • Khisti, A.1    Diggavi, S.N.2    Wornell, G.W.3
  • 20
    • 77958560746 scopus 로고    scopus 로고
    • Secure transmission with multiple antennas: The MIMOME wiretap channel
    • Nov.
    • A. Khisti and G. W. Wornell, "Secure transmission with multiple antennas: The MIMOME wiretap channel," IEEE Trans. Inf. Theory, vol. 56, pp. 5515-5532, Nov. 2010.
    • (2010) IEEE Trans. Inf. Theory , vol.56 , pp. 5515-5532
    • Khisti, A.1    Wornell, G.W.2
  • 21
    • 77953802876 scopus 로고    scopus 로고
    • Secure transmission with multiple antennas: The MISOME wiretap channel
    • Jul.
    • A. Khisti and G. W. Wornell, "Secure transmission with multiple antennas: The MISOME wiretap channel," IEEE Trans. Inf. Theory, vol. 56, pp. 3088-3104, Jul. 2010.
    • (2010) IEEE Trans. Inf. Theory , vol.56 , pp. 3088-3104
    • Khisti, A.1    Wornell, G.W.2
  • 23
    • 51349109773 scopus 로고    scopus 로고
    • The relay eavesdropper channel: Cooperation for secrecy
    • Sep.
    • L. Lai and H. E. Gamal, "The relay eavesdropper channel: Cooperation for secrecy," IEEE Trans. Inf. Theory, vol. 54, pp. 4005-4019, Sep. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , pp. 4005-4019
    • Lai, L.1    Gamal, H.E.2
  • 24
    • 66949180834 scopus 로고    scopus 로고
    • A note on the secrecy capacity of the multiple- antenna wiretap channel
    • Jun.
    • T. Liu and S. Shamai, "A note on the secrecy capacity of the multiple- antenna wiretap channel," IEEE Trans. Inf. Theory, vol. 55, pp. 2547-2553, Jun. 2009.
    • (2009) IEEE Trans. Inf. Theory , vol.55 , pp. 2547-2553
    • Liu, T.1    Shamai, S.2
  • 25
    • 84948960386 scopus 로고    scopus 로고
    • Information-theoretic key agreement: From weak to strong secrecy for free
    • U. Maurer and S. Wolf, "Information-theoretic key agreement: From weak to strong secrecy for free," in Proc. EUROCRYPT 2000, 2000, vol. 1807, pp. 351-368.
    • (2000) Proc. EUROCRYPT 2000 , vol.1807 , pp. 351-368
    • Maurer, U.1    Wolf, S.2
  • 26
    • 0027599802 scopus 로고
    • Secret key agreement by public discussion from common information
    • Mar.
    • U. M. Maurer, "Secret key agreement by public discussion from common information," IEEE Trans. Inf. Theory, vol. 39, pp. 733-742, Mar. 1993.
    • (1993) IEEE Trans. Inf. Theory , vol.39 , pp. 733-742
    • Maurer, U.M.1
  • 27
    • 45249086542 scopus 로고    scopus 로고
    • Shannon's secrecy system with informed receivers an its application to systematic coding for wiretapped channels
    • N. Merhav, "Shannon's secrecy system with informed receivers an its application to systematic coding for wiretapped channels," IEEE Trans. Inf. Theory, vol. 54, pp. 2723-2734, 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , pp. 2723-2734
    • Merhav, N.1
  • 30
    • 45249101530 scopus 로고    scopus 로고
    • The general Gaussian multiple-access and two-way wiretap channels: Achievable rates and cooperative jamming
    • Jun.
    • E. Tekin and A. Yener, "The general Gaussian multiple-access and two-way wiretap channels: Achievable rates and cooperative jamming," IEEE Trans. Inf. Theory, vol. 54, pp. 2735-2751, Jun. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , pp. 2735-2751
    • Tekin, E.1    Yener, A.2
  • 31
    • 0016562514 scopus 로고
    • The wiretap channel
    • A. D. Wyner, "The wiretap channel," Bell Syst. Tech. J., vol. 54, pp. 1355-1387, 1975.
    • (1975) Bell Syst. Tech. J. , vol.54 , pp. 1355-1387
    • Wyner, A.D.1
  • 32
    • 0031143282 scopus 로고    scopus 로고
    • Rate distortion theory for the shannon cipher system
    • May
    • H. Yamamoto, "Rate distortion theory for the shannon cipher system," IEEE Trans. Inf. Theory, vol. 43, May 1997.
    • (1997) IEEE Trans. Inf. Theory , vol.43
    • Yamamoto, H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.