2011
DOI: 10.1109/tifs.2011.2158999
|View full text |Cite
|
Sign up to set email alerts
|

Noncoherent Capacity of Secret-Key Agreement With Public Discussion

Abstract: Abstract-We study the non-coherent capacity of secret-key agreement with public discussion over i.i.d. Rayleigh Fading wireless channels, where neither the sender nor the receivers have access to instantaneous channel state information (CSI). We present two results. At high Signal-to-Noise Ratio (SNR), the secret-key capacity is bounded in SNR, regardless of the number of antennas at each terminal. Second, for a system with a single antenna at both the legitimate and the eavesdropper terminals and an arbitrary… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

1
21
0

Year Published

2011
2011
2018
2018

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 22 publications
(22 citation statements)
references
References 29 publications
1
21
0
Order By: Relevance
“…The rate of the Wyner-Ziv codebook must satisfy the rate constraint (22) and the associated secretkey rate is given by (19). Likewise the Wyner-Ziv codebook on the reverse channel must satisfy the rate constraint (23) and the associated rate of the secret-key is given by (20) We omit the secrecy analysis and a more detailed description of the proposed scheme due to space constraints.…”
Section: Proof Of Theoremmentioning
confidence: 99%
“…The rate of the Wyner-Ziv codebook must satisfy the rate constraint (22) and the associated secretkey rate is given by (19). Likewise the Wyner-Ziv codebook on the reverse channel must satisfy the rate constraint (23) and the associated rate of the secret-key is given by (20) We omit the secrecy analysis and a more detailed description of the proposed scheme due to space constraints.…”
Section: Proof Of Theoremmentioning
confidence: 99%
“…Specifically, we focus on ergodic fading channels with known statistics and we investigate the secure message rates and secret-key rates that can be obtained if there is only partial CSIT. In the extreme cases of perfect CSI and no CSI, the secrecy capacity and secret-key capacity have been studied for Single-Input Single Output (SISO) or Multiple-Input Multiple Output (MIMO) ergodic and block ergodic channels, see for instance [6], [7], [13]- [15]. However, to the best of our knowledge, few works analyze intermediate situations in which partial CSIT is available, for instance via a rate-limited feedback link.…”
Section: Introductionmentioning
confidence: 99%
“…The secret-key generation codebook is then used conditioned on this knowledge at all the terminals. We observe that the capacity achieving technique in [10], [12] that involves joint binning of the receiver output and channel gains is sub-optimal. We then extend these results to the case when the transmitter also has access to a noisy CSI of the legitimate receiver.…”
Section: Introductionmentioning
confidence: 97%
“…The secret-key capacity is characterized in an analogous manner and Gaussian inputs are shown to be optimal. Reference [12] studies a non-coherent i.i.d. Rayleigh fading CW model and establishes that (i) the capacity achieving distribution is discrete and (ii) the secret-key capacity remains bounded in the signal-tonoise ratio (SNR) regardless of the number of antennas at each terminal.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation