Secret-Key Generation Using Correlated Sources and Channels

We study the secret-key capacity in a joint source-channel coding setup-the terminals are connected over a discrete memoryless channel and have access to side information, modelled as a pair of discrete memoryless source sequences. As our main result, we establish the upper and lower bounds on the s...

Full description

Bibliographic Details
Main Authors: Khisti, Ashish (Author), Diggavi, Suhas N. (Author), Wornell, Gregory W. (Contributor)
Other Authors: Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science (Contributor)
Format: Article
Language:English
Published: Institute of Electrical and Electronics Engineers (IEEE), 2014-10-21T16:24:39Z.
Subjects:
Online Access:Get fulltext
LEADER 02173 am a22002053u 4500
001 91045
042 |a dc 
100 1 0 |a Khisti, Ashish  |e author 
100 1 0 |a Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science  |e contributor 
100 1 0 |a Wornell, Gregory W.  |e contributor 
700 1 0 |a Diggavi, Suhas N.  |e author 
700 1 0 |a Wornell, Gregory W.  |e author 
245 0 0 |a Secret-Key Generation Using Correlated Sources and Channels 
260 |b Institute of Electrical and Electronics Engineers (IEEE),   |c 2014-10-21T16:24:39Z. 
856 |z Get fulltext  |u http://hdl.handle.net/1721.1/91045 
520 |a We study the secret-key capacity in a joint source-channel coding setup-the terminals are connected over a discrete memoryless channel and have access to side information, modelled as a pair of discrete memoryless source sequences. As our main result, we establish the upper and lower bounds on the secret-key capacity. In the lower bound expression, the equivocation terms of the source and channel components are functionally additive even though the coding scheme generates a single secret-key by jointly taking into account the source and channel equivocations. Our bounds coincide, thus establishing the capacity, when the underlying wiretap channel can be decomposed into a set of independent, parallel, and reversely degraded channels. For the case of parallel Gaussian channels and jointly Gaussian sources we show that Gaussian codebooks achieve the secret-key capacity. In addition, when the eavesdropper also observes a correlated side information sequence, we establish the secret-key capacity when both the source and channel of the eavesdropper are a degraded version of the legitimate receiver. We finally also treat the case when a public discussion channel is available, propose a separation based coding scheme, and establish its optimality when the channel output symbols of the legitimate receiver and eavesdropper are conditionally independent given the input. 
520 |a National Science Foundation (U.S.) (Grant CCF-0515109) 
546 |a en_US 
655 7 |a Article 
773 |t IEEE Transactions on Information Theory