We consider a group of m + 1 trusted nodes that aim to create a shared secret key K over a network in the presence of a passive eavesdropper, Eve. We assume a linear non-coherent network coding broadcast channel (over a finite field Fq) from one of the honest nodes (i.e., Alice) to the rest of them including Eve. All of the trusted nodes can also discuss over a cost-free public channel which is also overheard by Eve. For this setup, we propose upper and lower bounds for the secret key generation capacity assuming that the field size q is very large. For the case of two trusted terminals (m = 1) our upper and lower bounds match and we have complete characterization for the secrecy capacity in the large field size regime
Increasingly, more spectrum bands are utilized for unlicensed use in wireless cognitive networks. It...
This paper investigates the problem of secret key generation over a wiretap channel when the termina...
We study the optimum location of an eavesdropper from a secrecy capacity perspective in multi-termin...
Abstract—Shannon theoretic secret key generation by several parties is considered for models in whic...
Abstract—We derive single-letter characterizations of (strong) secrecy capacities for models with an...
Abstract—Shannon theoretic shared secret key generation by multiple terminals is considered for a so...
Abstract—Since wireless channel is vulnerable to eavesdrop-pers, the secrecy during message delivery...
Abstract—Since wireless channel is vulnerable to eavesdrop-pers, the secrecy during message delivery...
The secrecy capacity of a network, for a given collection of permissible wiretap sets, is the maximu...
Abstract—We study the wireless secrecy capacity scaling prob-lem where the question of interest is h...
Abstract—We revisit the problem of secret key agreement in channel models, where in addition to a no...
Communication networks have had a transformative impact on our society as they have revolutionized a...
We investigate the problem of information theoretically secure communication in a line network with ...
This paper considers a special class of wiretap networks with a single source node and K sink nodes....
For a multi-source multi-terminal noiseless network, the key-dissemination problem involves the task...
Increasingly, more spectrum bands are utilized for unlicensed use in wireless cognitive networks. It...
This paper investigates the problem of secret key generation over a wiretap channel when the termina...
We study the optimum location of an eavesdropper from a secrecy capacity perspective in multi-termin...
Abstract—Shannon theoretic secret key generation by several parties is considered for models in whic...
Abstract—We derive single-letter characterizations of (strong) secrecy capacities for models with an...
Abstract—Shannon theoretic shared secret key generation by multiple terminals is considered for a so...
Abstract—Since wireless channel is vulnerable to eavesdrop-pers, the secrecy during message delivery...
Abstract—Since wireless channel is vulnerable to eavesdrop-pers, the secrecy during message delivery...
The secrecy capacity of a network, for a given collection of permissible wiretap sets, is the maximu...
Abstract—We study the wireless secrecy capacity scaling prob-lem where the question of interest is h...
Abstract—We revisit the problem of secret key agreement in channel models, where in addition to a no...
Communication networks have had a transformative impact on our society as they have revolutionized a...
We investigate the problem of information theoretically secure communication in a line network with ...
This paper considers a special class of wiretap networks with a single source node and K sink nodes....
For a multi-source multi-terminal noiseless network, the key-dissemination problem involves the task...
Increasingly, more spectrum bands are utilized for unlicensed use in wireless cognitive networks. It...
This paper investigates the problem of secret key generation over a wiretap channel when the termina...
We study the optimum location of an eavesdropper from a secrecy capacity perspective in multi-termin...