Secret Key Constructions for Simple Multiterminal Source Models

نویسندگان

  • Chunxuan Ye
  • Prakash Narayan
چکیده

This work is motivated by the results of Csiszár and Narayan (IEEE Trans. on Inform. Theory, Dec. 2004), which highlight innate connections between secrecy generation by multiple terminals and multiterminal Slepian-Wolf near-lossless data compression (sans secrecy restrictions). We propose a new approach for constructing secret keys based on the long-known Slepian-Wolf code for sources connected by a virtual additive noise channel, due to Wyner (IEEE Trans. on Inform. Theory, Jan. 1974). Explicit procedures for such constructions, and their substantiation, are provided.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Title of dissertation : INFORMATION THEORETIC GENERATION OF MULTIPLE SECRET KEYS

Title of dissertation: INFORMATION THEORETIC GENERATION OF MULTIPLE SECRET KEYS Chunxuan Ye, Doctor of Philosophy, 2005 Dissertation directed by: Professor Prakash Narayan Department of Electrical and Computer Engineering and Institute for System Research This dissertation studies the problem of secret key generation for encrypted group communication in a network, based on an information theore...

متن کامل

Multiterminal Secret Key Agreement at Asymptotically Zero Discussion Rate

In the multiterminal secret key agreement problem, a set of users want to discuss with each other until they share a common secret key independent of their discussion. We want to characterize the maximum secret key rate, called the secrecy capacity, asymptotically when the total discussion rate goes to zero. In the case of only two users, the capacity is equal to the Gács–Körner common informat...

متن کامل

Multiterminal Secrecy by Public Discussion

This monograph describes principles of information theoretic secrecy generation by legitimate parties with public discussion in the presence of an eavesdropper. The parties are guaranteed secrecy in the form of independence from the eavesdropper’s observation of the communication. Part I develops basic technical tools for secrecy generation, many of which are potentially of independent interest...

متن کامل

Information Theoretic Secret Key Generation: Structured codes and Tree Packing

Title of dissertation: INFORMATION THEORETIC SECRET KEY GENERATION: STRUCTURED CODES AND TREE PACKING Sirin Nitinawarat, Doctor of Philosophy, 2010 Dissertation directed by: Professor Prakash Narayan Department of Electrical and Computer Engineering Institute for Systems Research This dissertation deals with a multiterminal source model for secret key generation by multiple network terminals wi...

متن کامل

Secrecy from Resolvability

We analyze physical-layer security based on the premise that the coding mechanism for secrecy over noisy channels is tied to the notion of resolvability. Instead of considering capacity-based constructions, which associate to each message a sub-code that operates just below the capacity of the eavesdropper’s channel, we consider resolvability-based constructions, which associate to each message...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006