2015 IEEE International Symposium on Information Theory (ISIT) 2015
DOI: 10.1109/isit.2015.7282463
|View full text |Cite
|
Sign up to set email alerts
|

Secret key capacity: Talk or keep silent?

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
14
0

Year Published

2015
2015
2017
2017

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 12 publications
(14 citation statements)
references
References 9 publications
0
14
0
Order By: Relevance
“…4 3 Although the divergence is asymmetric and does not satisfy the triangle inequality, it is positive definite and is used in Pinsker's inequality to upper bound the variational distance. 4 After the submission of our work, we learned of a recent work [33] that also resolves the conjecture in [30]. Zhang et al [33] asked the more refined question of whether a user can keep silent in secret-key agreement without diminishing the capacity.…”
Section: Motivation From Secret-key Agreementmentioning
confidence: 89%
See 2 more Smart Citations
“…4 3 Although the divergence is asymmetric and does not satisfy the triangle inequality, it is positive definite and is used in Pinsker's inequality to upper bound the variational distance. 4 After the submission of our work, we learned of a recent work [33] that also resolves the conjecture in [30]. Zhang et al [33] asked the more refined question of whether a user can keep silent in secret-key agreement without diminishing the capacity.…”
Section: Motivation From Secret-key Agreementmentioning
confidence: 89%
“…4 After the submission of our work, we learned of a recent work [33] that also resolves the conjecture in [30]. Zhang et al [33] asked the more refined question of whether a user can keep silent in secret-key agreement without diminishing the capacity. We note that this question can be answered systematically under the current framework using the general properties derived for the MMI such as Corollary 5.3.…”
Section: Motivation From Secret-key Agreementmentioning
confidence: 89%
See 1 more Smart Citation
“…Unfortunately, a counterexample has been given by Chan et al [12] that shows that the condition is not necessary for four or more terminals [12]. This has also been independently observed by Zhang et al in [13].…”
mentioning
confidence: 86%
“…The theoretical underpinning of the MMI is a mathematical structure called the principal sequence of partitions (PSP) [60]. On the one hand, this structure enables the MMI and the clusters to be computed in strongly polynomial time [59,60] (see also [61]), and adds a new dimension to multi-terminal information theory [54][55][56][57][58][62][63][64][65][66]. On the other hand, the MMI enriches the abstract mathematical structure with informationtheoretic meanings.…”
Section: B Contributionsmentioning
confidence: 99%