Secret key agreement using correlated sources over the generalized multiple access channel
2012 (English)In: Information Theory Workshop (ITW), 2012 IEEE, IEEE , 2012, 467-471 p.Conference paper (Refereed)
A secret key agreement setup between three users is considered in which each of the users 1 and 2 intends to share a secret key with user 3 and users 1 and 2 are eavesdroppers with respect to each other. The three users observe i.i.d. outputs of correlated sources and there is a generalized discrete memoryless multiple access channel (GDMMAC) from users 1 and 2 to user 3 for communication between the users. The secret key agreement is established using the correlated sources and the GDMMAC. In this setup, inner and outer bounds of the secret key capacity region are investigated. Moreover, for a special case where the channel inputs and outputs and the sources form Markov chains in some order, the secret key capacity region is derived. Also a Gaussian case is considered in this setup.
Place, publisher, year, edition, pages
IEEE , 2012. 467-471 p.
Common Randomness, Information
Electrical Engineering, Electronic Engineering, Information Engineering
IdentifiersURN: urn:nbn:se:kth:diva-98081DOI: 10.1109/ITW.2012.6404717ISI: 000313526400096ScopusID: 2-s2.0-84873160431ISBN: 978-146730223-4OAI: oai:DiVA.org:kth-98081DiVA: diva2:535228
2012 IEEE Information Theory Workshop, ITW 2012; Lausanne;3 September 2012 through 7 September 2012
FunderICT - The Next Generation
QC 201301152012-06-192012-06-192013-04-15Bibliographically approved