메뉴 건너뛰기




Volumn 58, Issue 2, 2012, Pages 639-651

Secret key and private key constructions for simple multiterminal source models

Author keywords

Binary symmetric channel; LDPC codes; Maximum likelihood decoding; Perfect secrecy; Private key capacity; Private key construction; Secret key capacity; Secret key construction; Slepian wolf data compression

Indexed keywords

BINARY SYMMETRIC CHANNEL; LDPC CODES; MAXIMUM LIKELIHOOD DECODING; PERFECT SECRECY; PRIVATE KEY; SECRET KEY; SLEPIAN-WOLF;

EID: 84856830966     PISSN: 00189448     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIT.2011.2173731     Document Type: Article
Times cited : (26)

References (53)
  • 1
    • 84896963786 scopus 로고    scopus 로고
    • Compression with side information using turbo codes
    • Snowbird, UT, Apr.
    • A. Aaron and B. Girod, "Compression with side information using turbo codes," in Proc. IEEE Data Compression Conf., Snowbird, UT, Apr. 2002, pp. 252-261.
    • (2002) Proc. IEEE Data Compression Conf. , pp. 252-261
    • Aaron, A.1    Girod, B.2
  • 2
    • 0027629488 scopus 로고
    • Common randomness in information theory and cryptography, Part I: Secret sharing
    • Jul.
    • R. Ahlswede and I. Csiszár, "Common randomness in information theory and cryptography, Part I: Secret sharing," IEEE Trans. Inf. Theory, vol. 39, no. 4, pp. 1121-1132, Jul. 1993.
    • (1993) IEEE Trans. Inf. Theory , vol.39 , Issue.4 , pp. 1121-1132
    • Ahlswede, R.1    Csiszár, I.2
  • 4
    • 67650099990 scopus 로고    scopus 로고
    • Channel polarization: A method for constructing capacity- achieving codes for symmetric binary-input memoryless channel
    • Jul.
    • E. Arikan, "Channel polarization: A method for constructing capacity- achieving codes for symmetric binary-input memoryless channel," IEEE Trans. Inf. Theory, vol. 55, no. 7, pp. 3051-3073, Jul. 2009.
    • (2009) IEEE Trans. Inf. Theory , vol.55 , Issue.7 , pp. 3051-3073
    • Arikan, E.1
  • 8
    • 2642586749 scopus 로고    scopus 로고
    • On some new approaches to practical Slepian-Wolf compression inspired by channel coding
    • Snowbird, UT, Mar.
    • T. P. Coleman, A. H. Lee, M. Médard, and M. Effros, "On some new approaches to practical Slepian-Wolf compression inspired by channel coding," in Proc. IEEE Data Compression Conf., Snowbird, UT, Mar. 2004, pp. 282-291.
    • (2004) Proc. IEEE Data Compression Conf. , pp. 282-291
    • Coleman, T.P.1    Lee, A.H.2    Médard, M.3    Effros, M.4
  • 9
    • 0020152829 scopus 로고
    • Linear codes for sources and source networks: Error exponents, universal coding
    • Jul.
    • I. Csiszár, "Linear codes for sources and source networks: Error exponents, universal coding," IEEE Trans. Inf. Theory, vol. 28, no. 4, pp. 585-592, Jul. 1982.
    • (1982) IEEE Trans. Inf. Theory , vol.28 , Issue.4 , pp. 585-592
    • Csiszár, I.1
  • 11
    • 0033891095 scopus 로고    scopus 로고
    • Common randomness and secret key generation with a helper
    • Mar.
    • I. Csiszár and P. Narayan, "Common randomness and secret key generation with a helper," IEEE Trans. Inf. Theory, vol. 46, no. 2, pp. 344-366, Mar. 2000.
    • (2000) IEEE Trans. Inf. Theory , vol.46 , Issue.2 , pp. 344-366
    • Csiszár, I.1    Narayan, P.2
  • 12
    • 10644270917 scopus 로고    scopus 로고
    • Secrecy capacities for multiple terminals
    • Dec.
    • I. Csiszár and P. Narayan, "Secrecy capacities for multiple terminals," IEEE Trans. Inf. Theory, vol. 50, no. 12, pp. 3047-3061, Dec. 2004.
    • (2004) IEEE Trans. Inf. Theory , vol.50 , Issue.12 , pp. 3047-3061
    • Csiszár, I.1    Narayan, P.2
  • 13
    • 45249104852 scopus 로고    scopus 로고
    • Secrecy capacities for multiterminal channel models
    • Jun.
    • I. Csiszár and P. Narayan, "Secrecy capacities for multiterminal channel models," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2437-2452, Jun. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.6 , pp. 2437-2452
    • Csiszár, I.1    Narayan, P.2
  • 14
    • 0001807543 scopus 로고
    • Coding for noisy channels
    • P. Elias, "Coding for noisy channels," IRE Convention Rec., pt. 4, pp. 37-46, 1955.
    • (1955) IRE Convention Rec. , vol.PART.4 , pp. 37-46
    • Elias, P.1
  • 15
    • 84856812994 scopus 로고
    • Bounds for the probability of decoding error when using linear codes over memoryless channels
    • E. M. Gabidulin, "Bounds for the probability of decoding error when using linear codes over memoryless channels," Prob. Pered. Inf., vol. 3, pp. 55-62, 1967.
    • (1967) Prob. Pered. Inf. , vol.3 , pp. 55-62
    • Gabidulin, E.M.1
  • 16
    • 0001287157 scopus 로고    scopus 로고
    • Compression of correlated binary sources using turbo codes
    • Oct.
    • J. Garcia-Frias and Y. Zhao, "Compression of correlated binary sources using turbo codes," IEEE Commun. Lett., vol. 5, no. 11, pp. 417-419, Oct. 2001.
    • (2001) IEEE Commun. Lett. , vol.5 , Issue.11 , pp. 417-419
    • Garcia-Frias, J.1    Zhao, Y.2
  • 17
    • 0037351875 scopus 로고    scopus 로고
    • LDPC codes for compression of multi-terminal sources with hidden Markov correlation
    • Mar.
    • J. Garcia-Frias and W. Zhong, "LDPC codes for compression of multi-terminal sources with hidden Markov correlation," IEEE Commun. Lett., vol. 7, no. 3, pp. 115-117, Mar. 2003.
    • (2003) IEEE Commun. Lett. , vol.7 , Issue.3 , pp. 115-117
    • Garcia-Frias, J.1    Zhong, W.2
  • 19
    • 77954600460 scopus 로고    scopus 로고
    • Information-theoretic key agreement of multiple terminals-part I
    • Aug.
    • A. A. Gohari and V. Anantharam, "Information-theoretic key agreement of multiple terminals-part I," IEEE Trans. Inf. Theory, vol. 56, no. 8, pp. 3973-3996, Aug. 2010.
    • (2010) IEEE Trans. Inf. Theory , vol.56 , Issue.8 , pp. 3973-3996
    • Gohari, A.A.1    Anantharam, V.2
  • 20
    • 39049123787 scopus 로고    scopus 로고
    • On the duality between Slepian-Wolf coding and channel coding
    • Seattle, WA, Jul.
    • D.-K. He and E.-H. Yang, "On the duality between Slepian-Wolf coding and channel coding," in Proc. Int. Symp. Inf. Theory, Seattle, WA, Jul. 2006, pp. 2546-2550.
    • (2006) Proc. Int. Symp. Inf. Theory , pp. 2546-2550
    • He, D.-K.1    E.-H. Yang2
  • 21
    • 18144395071 scopus 로고    scopus 로고
    • A new coding scheme for the noisychannel Slepian-Wolf problem: Separate design and joint decoding
    • Dallas, TX
    • R. Hu, R. Viswanathan, and J. Li, "A new coding scheme for the noisychannel Slepian-Wolf problem: Separate design and joint decoding," in Proc. Global Commun. Conf., Dallas, TX, 2004.
    • (2004) Proc. Global Commun. Conf.
    • Hu, R.1    Viswanathan, R.2    Li, J.3
  • 24
    • 2642563901 scopus 로고    scopus 로고
    • Slepian-Wolf coding for nonuniform sources using turbo codes
    • Snowbird, UT, Mar.
    • J. Li, Z. Tu, and R. Blum, "Slepian-Wolf coding for nonuniform sources using turbo codes," in Proc. IEEE Data Compression Conf., Snowbird, UT, Mar. 2004, pp. 312-321.
    • (2004) Proc. IEEE Data Compression Conf. , pp. 312-321
    • Li, J.1    Tu, Z.2    Blum, R.3
  • 26
    • 0036810616 scopus 로고    scopus 로고
    • Compression of binary sources with side information at the decoding using LDPC codes
    • Oct.
    • A. D. Liveris, Z. Xiong, and C. N. Georghiades, "Compression of binary sources with side information at the decoding using LDPC codes," IEEE Commun. Lett., vol. 6, no. 10, pp. 440-442, Oct. 2002.
    • (2002) IEEE Commun. Lett. , vol.6 , Issue.10 , pp. 440-442
    • Liveris, A.D.1    Xiong, Z.2    Georghiades, C.N.3
  • 28
    • 0033099611 scopus 로고    scopus 로고
    • Good error correcting codes based on very sparse matrices
    • Mar.
    • D. J. C. Mackay, "Good error correcting codes based on very sparse matrices," IEEE Trans. Inf. Theory, vol. 45, no. 2, pp. 399-431, Mar. 1999.
    • (1999) IEEE Trans. Inf. Theory , vol.45 , Issue.2 , pp. 399-431
    • Mackay, D.J.C.1
  • 30
    • 0016046144 scopus 로고
    • Probabilistic characteristics of graphs with large connectivity
    • Apr.
    • G. A. Margulis, "Probabilistic characteristics of graphs with large connectivity," Probl. Inf. Trans., vol. 10, pp. 174-179, Apr. 1974.
    • (1974) Probl. Inf. Trans. , vol.10 , pp. 174-179
    • Margulis, G.A.1
  • 31
    • 0027599802 scopus 로고
    • Secret key agreement by public discussion from common information
    • May
    • U. M. Maurer, "Secret key agreement by public discussion from common information," IEEE Trans. Inf. Theory, vol. 39, no. 3, pp. 733-742, May 1993.
    • (1993) IEEE Trans. Inf. Theory , vol.39 , Issue.3 , pp. 733-742
    • Maurer, U.M.1
  • 32
    • 84948410230 scopus 로고    scopus 로고
    • Turbo source coding: A noise-robust approach to data compression
    • Snowbird, UT, Apr.
    • P. Mitran and J. Bajcsy, "Turbo source coding: A noise-robust approach to data compression," in IEEE Data Compression Conf., Snowbird, UT, Apr. 2002, p. 465.
    • (2002) IEEE Data Compression Conf. , pp. 465
    • Mitran, P.1    Bajcsy, J.2
  • 33
    • 33747886952 scopus 로고    scopus 로고
    • Secret key agreement from correlated source outputs using LDPC matrices
    • Jul.
    • J. Muramatsu, "Secret key agreement from correlated source outputs using LDPC matrices," IEICE Trans. Fundamentals, vol. E89-A, pp. 2036-2046, Jul. 2006.
    • (2006) IEICE Trans. Fundamentals , vol.E89-A , pp. 2036-2046
    • Muramatsu, J.1
  • 34
    • 45249118588 scopus 로고    scopus 로고
    • Secret key generation for correlated Gaussian sources
    • Monticello, IL, Sep.
    • S. Nitinawarat, "Secret key generation for correlated Gaussian sources," in Proc. Allerton Conf. Commun., Control, and Computing, Monticello, IL, Sep. 2007, pp. 1054-1058.
    • (2007) Proc. Allerton Conf. Commun., Control, and Computing , pp. 1054-1058
    • Nitinawarat, S.1
  • 35
    • 84856814516 scopus 로고    scopus 로고
    • Secret key generation for correlated Gaussian sources
    • to be published
    • S. Nitinawarat and P. Narayan, "Secret key generation for correlated Gaussian sources," IEEE Trans. Inf. Theory, 2011, to be published.
    • (2011) IEEE Trans. Inf. Theory
    • Nitinawarat, S.1    Narayan, P.2
  • 37
    • 0037356065 scopus 로고    scopus 로고
    • Distributed source coding using syndromes (DISCUS): Design and construction
    • Mar.
    • S. S. Pradhan and K. Ramchandran, "Distributed source coding using syndromes (DISCUS): Design and construction," IEEE Trans. Inf. Theory, vol. 49, no. 3, pp. 626-643, Mar. 2003.
    • (2003) IEEE Trans. Inf. Theory , vol.49 , Issue.3 , pp. 626-643
    • Pradhan, S.S.1    Ramchandran, K.2
  • 38
    • 35248888499 scopus 로고    scopus 로고
    • New bounds in secret-key agreement: The gap between formation and secrecy extraction
    • Lecture Notes in Computer Science
    • R. Renner and S. Wolf, "New bounds in secret-key agreement: The gap between formation and secrecy extraction," in Proc. EUROCRYPT, 2003, vol. 2656, Lecture Notes in Computer Science, pp. 562-577.
    • (2003) Proc. EUROCRYPT , vol.2656 , pp. 562-577
    • Renner, R.1    Wolf, S.2
  • 39
    • 0035246307 scopus 로고    scopus 로고
    • The capacity of low-density parity-check codes under message-passing decoding
    • Feb.
    • T. J. Richardson and R. L. Urbanke, "The capacity of low-density parity-check codes under message-passing decoding," IEEE Trans. Inf. Theory, vol. 47, no. 2, pp. 599-618, Feb. 2001.
    • (2001) IEEE Trans. Inf. Theory , vol.47 , Issue.2 , pp. 599-618
    • Richardson, T.J.1    Urbanke, R.L.2
  • 43
    • 2642523145 scopus 로고    scopus 로고
    • Distributed code constructions for the entire Slepian-Wolf rate region for arbitrarily correlated sources
    • Snowbird, UT, Mar.
    • D. Schonberg, K. Ramchandran, and S. S. Pradhan, "Distributed code constructions for the entire Slepian-Wolf rate region for arbitrarily correlated sources," in Proc. IEEE Data Compression Conf., Snowbird, UT, Mar. 2004, pp. 292-301.
    • (2004) Proc. IEEE Data Compression Conf. , pp. 292-301
    • Schonberg, D.1    Ramchandran, K.2    Pradhan, S.S.3
  • 44
    • 0019608335 scopus 로고
    • A recursive approach to low complexity codes
    • Sep.
    • R. M. Tanner, "A recursive approach to low complexity codes," IEEE Trans. Inf. Theory, vol. 27, no. 5, pp. 533-547, Sep. 1981.
    • (1981) IEEE Trans. Inf. Theory , vol.27 , Issue.5 , pp. 533-547
    • Tanner, R.M.1
  • 47
    • 34548060655 scopus 로고    scopus 로고
    • Channel identification: Secret sharing using reciprocity in ultrawideband channels
    • Sep.
    • R. Wilson, D. Tse, and R. Scholtz, "Channel identification: Secret sharing using reciprocity in ultrawideband channels," IEEE Trans. Inf. Foren. Secur., vol. 2, no. 3, pp. 364-375, Sep. 2007.
    • (2007) IEEE Trans. Inf. Foren. Secur. , vol.2 , Issue.3 , pp. 364-375
    • Wilson, R.1    Tse, D.2    Scholtz, R.3
  • 48
    • 0015992185 scopus 로고
    • Recent results in the Shannon theory
    • Jan.
    • A. D. Wyner, "Recent results in the Shannon theory," IEEE Trans. Inf. Theory, vol. 20, no. 1, pp. 2-10, Jan. 1974.
    • (1974) IEEE Trans. Inf. Theory , vol.20 , Issue.1 , pp. 2-10
    • Wyner, A.D.1
  • 49
    • 33749443558 scopus 로고    scopus 로고
    • Secret key and private key constructions for simple multiterminal source models
    • Adelaide, Australia, Sep.
    • C. Ye and P. Narayan, "Secret key and private key constructions for simple multiterminal source models," in Proc. IEEE Int. Symp. Inf. Theory, Adelaide, Australia, Sep. 2005, pp. 2133-2137.
    • (2005) Proc. IEEE Int. Symp. Inf. Theory , pp. 2133-2137
    • Ye, C.1    Narayan, P.2
  • 50
    • 84856897739 scopus 로고    scopus 로고
    • Secret key constructions for simple multiterminal source models
    • San Diego, CA, Feb.
    • C. Ye and P. Narayan, "Secret key constructions for simple multiterminal source models," in Proc. Inf. Theory and ApplicationsWorkshop, San Diego, CA, Feb. 2006.
    • (2006) Proc. Inf. Theory and Applications Workshop
    • Ye, C.1    Narayan, P.2
  • 51
    • 39049156464 scopus 로고    scopus 로고
    • Extracting secrecy from jointly Gaussian random variables
    • Jul.
    • C. Ye, A. Reznik, and Y. Shah, "Extracting secrecy from jointly Gaussian random variables," in Proc. Int. Symp. Inf. Theory, Jul. 2006, pp. 2593-2597.
    • (2006) Proc. Int. Symp. Inf. Theory , pp. 2593-2597
    • Ye, C.1    Reznik, A.2    Shah, Y.3
  • 52
    • 77952604175 scopus 로고    scopus 로고
    • Information-theoretically secret key generation for fading wireless channels
    • Jun.
    • C. Ye, S. Mathur, A. Reznik, Y. Shah, W. Trappe, and N. Mandayam, "Information-theoretically secret key generation for fading wireless channels," IEEE Trans. Inf. Foren. Secur., vol. 5, no. 2, pp. 240-254, Jun. 2010.
    • (2010) IEEE Trans. Inf. Foren. Secur. , vol.5 , Issue.2 , pp. 240-254
    • Ye, C.1    Mathur, S.2    Reznik, A.3    Shah, Y.4    Trappe, W.5    Mandayam, N.6


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.