The Gaussian wiretap channel with correlated sources at the terminals: Secret communication and key generation

Alexander Bunin, Pablo Piantanida, Shlomo Shamai Shitz

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

This paper considers the setup of Alice, Bob and Eve sharing a Gaussian Broadcast channel, and correlated Gaussian sources, assuming these are independent of the channel components. Both secret key generation and secret message transmission are considered. A closed form expression is presented characterizing the optimal trade-off between the secret key and the secret message rates. A few known results are shown to be accepted as special cases.

Original languageEnglish
Title of host publication2016 IEEE International Conference on the Science of Electrical Engineering, ICSEE 2016
ISBN (Electronic)9781509021529
DOIs
StatePublished - 4 Jan 2017
Event2016 IEEE International Conference on the Science of Electrical Engineering, ICSEE 2016 - Eilat, Israel
Duration: 16 Nov 201618 Nov 2016

Publication series

Name2016 IEEE International Conference on the Science of Electrical Engineering, ICSEE 2016

Conference

Conference2016 IEEE International Conference on the Science of Electrical Engineering, ICSEE 2016
Country/TerritoryIsrael
CityEilat
Period16/11/1618/11/16

Keywords

  • Common Randomness
  • Gaussian Models
  • Secrecy Capacity
  • Secret Key Agreement
  • Wiretap Channels

All Science Journal Classification (ASJC) codes

  • Computer Science Applications
  • Hardware and Architecture
  • Artificial Intelligence
  • Computer Networks and Communications
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'The Gaussian wiretap channel with correlated sources at the terminals: Secret communication and key generation'. Together they form a unique fingerprint.

Cite this