Title :
Secret-Key Generation Using Correlated Sources and Channels
Author :
Khisti, Ashish ; Diggavi, Suhas N. ; Wornell, Gregory W.
Author_Institution :
Dept. of Electr. & Comput. Eng., Univ. of Toronto, Toronto, ON, Canada
Abstract :
We study the secret-key capacity in a joint source-channel coding setup-the terminals are connected over a discrete memoryless channel and have access to side information, modelled as a pair of discrete memoryless source sequences. As our main result, we establish the upper and lower bounds on the secret-key capacity. In the lower bound expression, the equivocation terms of the source and channel components are functionally additive even though the coding scheme generates a single secret-key by jointly taking into account the source and channel equivocations. Our bounds coincide, thus establishing the capacity, when the underlying wiretap channel can be decomposed into a set of independent, parallel, and reversely degraded channels. For the case of parallel Gaussian channels and jointly Gaussian sources we show that Gaussian codebooks achieve the secret-key capacity. In addition, when the eavesdropper also observes a correlated side information sequence, we establish the secret-key capacity when both the source and channel of the eavesdropper are a degraded version of the legitimate receiver. We finally also treat the case when a public discussion channel is available, propose a separation based coding scheme, and establish its optimality when the channel output symbols of the legitimate receiver and eavesdropper are conditionally independent given the input.
Keywords :
Gaussian channels; channel coding; correlation methods; cryptography; memoryless systems; source coding; Gaussian codebook; correlated channel; correlated source; discrete memoryless channel; discrete memoryless source sequence; independent channel; joint source-channel coding; jointly Gaussian sources; parallel Gaussian channel; reversely degraded channel; secret key generation; side information; Channel coding; Information rates; Joints; Random variables; Receivers; Upper bound; Information theoretic security; joint source-channel coding; public discussion; secret-key agreement; wiretap channel;
Journal_Title :
Information Theory, IEEE Transactions on
DOI :
10.1109/TIT.2011.2173629