Computer Science – Information Theory
Scientific paper
2008-07-07
Computer Science
Information Theory
16 pages, 3 figures, expanded version of a paper of the same title which will appear at IEEE International Symposium on Inform
Scientific paper
Alice and Bob want to share a secret key and to communicate an independent message, both of which they desire to be kept secret from an eavesdropper Eve. We study this problem of secret communication and secret key generation when two resources are available -- correlated sources at Alice, Bob, and Eve, and a noisy broadcast channel from Alice to Bob and Eve which is independent of the sources. No other resource, in particular, no other channel is available. We are interested in characterizing the fundamental trade-off between the rates of the secret message and secret key. We present an achievable solution based on a separation architecture and prove its optimality for the parallel channels and sources case when each sub-channel and source component satisfies a degradation order (either in favor of the legitimate receiver or the eavesdropper).
Eswaran Krishnan
Prabhakaran Vinod M.
Ramchandran Kannan
No associations
LandOfFree
Secrecy via Sources and Channels -- A Secret Key - Secret Message Rate Trade-off Region does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.
If you have personal experience with Secrecy via Sources and Channels -- A Secret Key - Secret Message Rate Trade-off Region, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Secrecy via Sources and Channels -- A Secret Key - Secret Message Rate Trade-off Region will most certainly appreciate the feedback.
Profile ID: LFWR-SCP-O-560844