Secret-Key Agreement With Channel State Information at the Transmitter

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Covert Communication with Channel-State Information at the Transmitter

We consider the problem of covert communication over a state-dependent channel, where the transmitter has causal or noncausal knowledge of the channel states. Here, “covert” means that a warden on the channel should observe similar statistics when the transmitter is sending a message and when it is not. When a sufficiently long secret key is shared between the transmitter and the receiver, we d...

متن کامل

Adaptive MIMO Systems with Channel State Information at Transmitter

This dissertation presents adaptation techniques that can achieve high spectral efficiency for single user multiple-input multiple-output (MIMO) systems. Two types of adaptation techniques, adaptive modulation and adaptive power allocation, are employed to adapt the rate and the transmit power to fading channels. We start by investigating the adaptive modulation subject to a certain bit-error-r...

متن کامل

Information-Theoretic Secret-Key Agreement: The Asymptotically Tight Relation Between the Secret-Key Rate and the Channel Quality Ratio

Information-theoretically secure secret-key agreement between two parties Alice and Bob is a well-studied problem that is provably impossible in a plain model with public (authenticated) communication, but is known to be possible in a model where the parties also have access to some correlated randomness. One particular type of such correlated randomness is the so-called satellite setting, wher...

متن کامل

Towards Characterizing When Information-Theoretic Secret Key Agreement Is Possible

This paper is concerned with information-theoretically secure secret key agreement in the general scenario where three parties,quence of random bits broadcast by a satellite. We consider the problem of determining for a given distribution PXY Z whether Alice and Bob can in principle, by communicating over an insecure channel accessible to Eve, generate a secret key about which Eve's information...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Information Forensics and Security

سال: 2011

ISSN: 1556-6013,1556-6021

DOI: 10.1109/tifs.2011.2151188