Abstract—We study the capacity of secret-key agreement over a wiretap channel with state parameters. The transmitter com-municates to the legitimate receiver and the eavesdropper over a discrete memoryless wiretap channel with a memoryless state sequence. The transmitter and the legitimate receiver generate a common key that must be concealed from the eavesdropper. We assume that the state sequence is known non-causally to the transmitter and no public discussion channel is available. We derive lower and upper bounds on the secret-key capacity. The lower bound involves constructing a common reconstruction sequence at the legitimate terminals and binning the set of reconstruction sequences to obtain the secret-key. For the special case of Ga...
Abstract—We study the Rayleigh fading non-coherent capacity of secret-key agreement with public disc...
International audienceWe consider the problem of covert communication over a state-dependent channel...
We consider a 1-to-K communication scenario, where a source transmits private messages to K receiver...
We study secret-key agreement protocols over a wiretap channel controlled by a state parameter. The ...
Abstract—We study secret-key agreement protocols over a wiretap channel controlled by a state parame...
Abstract—In this paper, we consider the problem of secret key agreement in state-dependent 3-receive...
Abstract — We study secret-key agreement with public discussion over a flat-fading wiretap channel m...
Abstract—We consider the fundamental limits of the secret key generation problem when the sources ar...
We consider the problem of covert communication over a state-dependent channel, where the transmitte...
International audienceWe consider the problem of covert communication over a state-dependent channel...
International audienceThis paper investigates the problem of secret key generation over a wiretap ch...
Abstract—We revisit the problem of secret key agreement in channel models, where in addition to a no...
We consider secret key agreement over the Gaussian two-way wiretap channel (GTWWC), where all the re...
Abstract—We consider a three-receiver wiretap channel in which the transmitter aims to send a common...
Abstract—We study secret-key agreement over a non-coherent block-fading multiple input multiple outp...
Abstract—We study the Rayleigh fading non-coherent capacity of secret-key agreement with public disc...
International audienceWe consider the problem of covert communication over a state-dependent channel...
We consider a 1-to-K communication scenario, where a source transmits private messages to K receiver...
We study secret-key agreement protocols over a wiretap channel controlled by a state parameter. The ...
Abstract—We study secret-key agreement protocols over a wiretap channel controlled by a state parame...
Abstract—In this paper, we consider the problem of secret key agreement in state-dependent 3-receive...
Abstract — We study secret-key agreement with public discussion over a flat-fading wiretap channel m...
Abstract—We consider the fundamental limits of the secret key generation problem when the sources ar...
We consider the problem of covert communication over a state-dependent channel, where the transmitte...
International audienceWe consider the problem of covert communication over a state-dependent channel...
International audienceThis paper investigates the problem of secret key generation over a wiretap ch...
Abstract—We revisit the problem of secret key agreement in channel models, where in addition to a no...
We consider secret key agreement over the Gaussian two-way wiretap channel (GTWWC), where all the re...
Abstract—We consider a three-receiver wiretap channel in which the transmitter aims to send a common...
Abstract—We study secret-key agreement over a non-coherent block-fading multiple input multiple outp...
Abstract—We study the Rayleigh fading non-coherent capacity of secret-key agreement with public disc...
International audienceWe consider the problem of covert communication over a state-dependent channel...
We consider a 1-to-K communication scenario, where a source transmits private messages to K receiver...