Computer Science – Information Theory
Scientific paper
2012-04-13
Computer Science
Information Theory
Scientific paper
A secret key agreement setup between three users is considered in which each of the users 1 and 2 intends to share a secret key with user 3 and users 1 and 2 are eavesdroppers with respect to each other. The three users observe i.i.d. outputs of correlated sources and there is a generalized discrete memoryless multiple access channel (GDMMAC) from users 1 and 2 to user 3 for communication between the users. The secret key agreement is established using the correlated sources and the GDMMAC. In this setup, inner and outer bounds of the secret key capacity region are investigated. Moreover, for a special case where the channel inputs and outputs and the sources form Markov chains in some order, the secret key capacity region is derived. Also a Gaussian case is considered in this setup.
Salimi Somayeh
Skoglund Mikael
No associations
LandOfFree
Secret Key Agreement Using Correlated Sources over the Generalized Multiple Access Channel does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.
If you have personal experience with Secret Key Agreement Using Correlated Sources over the Generalized Multiple Access Channel, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Secret Key Agreement Using Correlated Sources over the Generalized Multiple Access Channel will most certainly appreciate the feedback.
Profile ID: LFWR-SCP-O-143731