Secret-Key Agreement With Channel State Information at the Transmitter

@article{Khisti2011SecretKeyAW,
  title={Secret-Key Agreement With Channel State Information at the Transmitter},
  author={Ashish Khisti and Suhas N. Diggavi and Gregory W. Wornell},
  journal={IEEE Transactions on Information Forensics and Security},
  year={2011},
  volume={6},
  pages={672-681}
}
We study the capacity of secret-key agreement over a wiretap channel with state parameters. The transmitter, the legitimate receiver, and the eavesdropper are connected by a discrete memoryless wiretap channel with a memoryless state sequence. The transmitter and the legitimate receiver generate a secret-key that must be concealed from the eavesdropper. We assume that the state sequence is known noncausally to the transmitter and no public discussion channel is available. We derive lower and… CONTINUE READING

Citations

Publications citing this paper.
SHOWING 1-10 OF 39 CITATIONS

Wiretap channels with random states non-causally available at the encoder

  • 2016 IEEE International Conference on the Science of Electrical Engineering (ICSEE)
  • 2016
VIEW 8 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

Key Generation Over Wiretap Models With Non-Causal Side Information

  • IEEE Transactions on Information Forensics and Security
  • 2015
VIEW 4 EXCERPTS
CITES METHODS & BACKGROUND
HIGHLY INFLUENCED

Key-Message Security over State-Dependent Wiretap Channels

  • 2018 IEEE International Symposium on Information Theory (ISIT)
  • 2018
VIEW 1 EXCERPT
CITES BACKGROUND

On Simultaneously Generating Multiple Keys in a Joint Source-Channel Model

  • IEEE Transactions on Information Forensics and Security
  • 2017
VIEW 1 EXCERPT
CITES BACKGROUND

References

Publications referenced by this paper.
SHOWING 1-10 OF 38 REFERENCES

Secret key agreement using asymmetry in channel state knowledge

  • 2009 IEEE International Symposium on Information Theory
  • 2009
VIEW 7 EXCERPTS

Wiretap Channel With Two-Sided Channel State Information

  • 2007 Conference Record of the Forty-First Asilomar Conference on Signals, Systems and Computers
  • 2007
VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL

An achievable region for the Gaussian wiretap channel with side information

  • IEEE Transactions on Information Theory
  • 2006
VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL

Writing on dirty paper

  • IEEE Trans. Information Theory
  • 1983
VIEW 3 EXCERPTS
HIGHLY INFLUENTIAL

Wireless Information-Theoretic Security in MANETs

  • 2013 IEEE International Conference on Communications Workshops (ICC)
  • 2013

Secrecy via Sources and Channels

  • IEEE Transactions on Information Theory
  • 2012
VIEW 3 EXCERPTS