메뉴 건너뛰기




Volumn 58, Issue 4, 2012, Pages 2455-2474

Key generation using external source excitation: Capacity, reliability, and secrecy exponent

Author keywords

Channel sounding; error exponent; multipath randomness; privacy amplification; public discussion; reciprocal wireless channel; secrecy exponent; secret key capacity; secret key generation

Indexed keywords

CHANNEL SOUNDING; ERROR EXPONENT; MULTIPATH RANDOMNESS; PRIVACY AMPLIFICATION; PUBLIC DISCUSSION; RECIPROCAL WIRELESS CHANNEL; SECRECY EXPONENT; SECRET KEY;

EID: 84858994663     PISSN: 00189448     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIT.2011.2176311     Document Type: Article
Times cited : (32)

References (30)
  • 1
    • 70449469434 scopus 로고    scopus 로고
    • Minimum energy per bit for secret key acquisition over multipath wireless channels
    • San Diego, CA, Jan.
    • T. Chou, A. Sayeed, and S. Draper, "Minimum energy per bit for secret key acquisition over multipath wireless channels," in Proc. Workshop on Inf. Theory Appl., San Diego, CA, Jan. 2009.
    • (2009) Proc. Workshop on Inf. Theory Appl.
    • Chou, T.1    Sayeed, A.2    Draper, S.3
  • 2
    • 70449469434 scopus 로고    scopus 로고
    • Minimum energy per bit for secret key acquisition over multipath wireless channels
    • Seoul, Korea, Jun.
    • T. Chou, A. Sayeed, and S. Draper, "Minimum energy per bit for secret key acquisition over multipath wireless channels," in Proc. IEEE Int. Symp. Inf. Theory(ISIT 2009), Seoul, Korea, Jun. 2009.
    • (2009) Proc. IEEE Int. Symp. Inf. Theory(ISIT 2009)
    • Chou, T.1    Sayeed, A.2    Draper, S.3
  • 3
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • Oct.
    • C. E. Shannon, "Communication theory of secrecy systems," Bell Syst. Tech. J., vol. 28, pp. 656-715, Oct. 1949.
    • (1949) Bell Syst. Tech. J. , vol.28 , pp. 656-715
    • Shannon, C.E.1
  • 4
    • 0016562514 scopus 로고
    • The wire-tap channel
    • Oct.
    • A. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, pp. 1355-1387, Oct. 1975.
    • (1975) Bell Syst. Tech. J. , vol.54 , pp. 1355-1387
    • Wyner, A.1
  • 5
    • 0017973511 scopus 로고
    • Broadcast channels with confidential messages
    • May
    • I. Csiszár and J. Körner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. 24, pp. 339-348, May 1978.
    • (1978) IEEE Trans. Inf. Theory , vol.24 , pp. 339-348
    • Csiszár, I.1    Körner, J.2
  • 6
    • 0027599802 scopus 로고
    • Secret key agreement by public discussion from common information
    • May
    • U. M. Maurer, "Secret key agreement by public discussion from common information," IEEE Trans. Inf. Theory, vol. 39, pp. 733-742, May 1993.
    • (1993) IEEE Trans. Inf. Theory , vol.39 , pp. 733-742
    • Maurer, M.U.1
  • 7
    • 0027629488 scopus 로고
    • Common randomness in information theory and cryptography Part I: Secret sharing
    • Jul.
    • R. Ahlswede and I. Csiszár, "Common randomness in information theory and cryptography Part I: Secret sharing," IEEE Trans. Inf. Theory, vol. 39, pp. 1121-1132, Jul. 1993.
    • (1993) IEEE Trans. Inf. Theory , vol.39 , pp. 1121-1132
    • Ahlswede, R.1    Csiszár, I.2
  • 8
    • 0015648934 scopus 로고
    • Noiseless coding of correlated information sources
    • Jul.
    • D. Slepian and J. Wolf, "Noiseless coding of correlated information sources," IEEE Trans. Inf. Theory, vol. 19, pp. 471-480, Jul. 1973.
    • (1973) IEEE Trans. Inf. Theory , vol.19 , pp. 471-480
    • Slepian, D.1    Wolf, J.2
  • 11
    • 0025485582 scopus 로고
    • On channel capacity per unit cost
    • DOI 10.1109/18.57201
    • S. Verdu, "On channel capacity per unit cost," IEEE Trans. Inf. Theory, vol. 36, pp. 1019-1030, Sep. 1990. (Pubitemid 20738361)
    • (1990) IEEE Transactions on Information Theory , vol.36 , Issue.5 , pp. 1019-1030
    • Verdu Sergio1
  • 12
    • 39049156464 scopus 로고    scopus 로고
    • Extracting secrecy from jointly Gaussian random variables
    • DOI 10.1109/ISIT.2006.262101, 4036441, Proceedings - 2006 IEEE International Symposium on Information Theory, ISIT 2006
    • C. Ye, A. Reznik, and Y. Shah, "Extracting secrecy from jointly Gaussian random variables," in Proc. IEEE Int. Symp. Inf. Theory Inf. Theory (2006) , Jul. 2006, pp. 2593-2597. (Pubitemid 351244572)
    • (2006) IEEE International Symposium on Information Theory - Proceedings , pp. 2593-2597
    • Ye, C.1    Reznik, A.2    Shah, Y.3
  • 13
    • 45249118588 scopus 로고    scopus 로고
    • Secret key generation for correlated Gaussian sources
    • S. Nitinawarat, "Secret key generation for correlated Gaussian sources," in Proc. 45th Ann. Allerton Conf., 2007.
    • (2007) Proc. 45th Ann. Allerton Conf.
    • Nitinawarat, S.1
  • 15
    • 51449114762 scopus 로고    scopus 로고
    • Secure wireless communications: Secret keys through multipath
    • Las Vegas, NV
    • A. Sayeed and A. Perrig, "Secure wireless communications: Secret keys through multipath," in Proc. IEEE Int. Conf. ICASSP 2008, Las Vegas, NV, 2008, pp. 3013-3016.
    • (2008) Proc. IEEE Int. Conf. ICASSP , vol.2008 , pp. 3013-3016
    • Sayeed, A.1    Perrig, A.2
  • 16
    • 34548060655 scopus 로고    scopus 로고
    • Channel identification: Secret sharing using reciprocity in ultrawideband channels
    • DOI 10.1109/TIFS.2007.902666
    • R. Wilson, D. Tse, and R. A. Scholtz, "Channel identification: Secret sharing using reciprocity in ultrawideband channels," IEEE Trans. Inf. Forens. Secur., vol. 2, pp. 364-375, Sep. 2007. (Pubitemid 47290572)
    • (2007) IEEE Transactions on Information Forensics and Security , vol.2 , Issue.3 , pp. 364-375
    • Wilson, R.1    Tse, D.2    Scholtz, R.A.3
  • 19
    • 70349883977 scopus 로고    scopus 로고
    • Key generation exploiting MIMO channel evolution: Algorithms and theoretical limits
    • Mar.
    • J.Wallace, C. Chen, andM. Jensen, "Key generation exploiting MIMO channel evolution: Algorithms and theoretical limits," in Proc. 3rd Eur. Conf. Antennas Propag. (EuCAP 2009), Mar. 2009, pp. 1499-1503.
    • (2009) Proc. 3rd Eur. Conf. Antennas Propag. (EuCAP 2009) , pp. 1499-1503
    • Wallace, J.1    Chen, C.2    Jensen, M.3
  • 20
    • 72249083097 scopus 로고    scopus 로고
    • High-rate uncorrelated bit extraction for shared secret key generation from channel measurements
    • Jan.
    • N. Patwari, J. Croft, S. Jana, and S. K. Kasera, "High-rate uncorrelated bit extraction for shared secret key generation from channel measurements," IEEE Trans. Mobile Comput., vol. 9, pp. 17-30, Jan. 2010.
    • (2010) IEEE Trans. Mobile Comput. , vol.9 , pp. 17-30
    • Patwari, N.1    Croft, J.2    Jana, S.3    Kasera, K.S.4
  • 26
    • 79957636296 scopus 로고    scopus 로고
    • Exponential decreasing rate of leaked information in universal random privacy amplification
    • Jun.
    • M. Hayashi, "Exponential decreasing rate of leaked information in universal random privacy amplification," IEEE Trans. Inf. Theory, vol. 57, pp. 3989-4001, Jun. 2011.
    • (2011) IEEE Trans. Inf. Theory , vol.57 , pp. 3989-4001
    • Hayashi, M.1
  • 28
    • 33947666069 scopus 로고    scopus 로고
    • Channel coherence in the low- SNRregime
    • Mar.
    • L. Zheng, D. N. C. Tse, andM.Medard, "Channel coherence in the low- SNRregime," IEEETrans. Inf.Theory, vol. 53, pp. 976-997, Mar. 2007.
    • (2007) IEEETrans. Inf.Theory , vol.53 , pp. 976-997
    • Zheng, L.1    Tse, C.N.D.2    Medard, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.