Abstract—We study a two-terminal secret-key generation problem over a two-way, approximately reciprocal, block-fading channel. The channel gains between the legitimate terminals are not revealed to any terminal, whereas the channel gains of the eaves-dropper are revealed perfectly to the eavesdropper. We study a separation based scheme that involves a training phase followed by a communication phase within each block. The training phase generates correlated estimates of the channel state sequence be-tween the two terminals, whereas the communication phase generates correlated source sequences between the two terminals. A portion of the secret-key is gen-erated from the correlated channel state sequences by creating omniscience between the l...
We study secret-key agreement protocols over a wiretap channel controlled by a state parameter. The ...
Abstract—We design and analyze a method to extract secret keys from the randomness inherent to wirel...
In this paper, we present a secret key distribution protocol without resorting to a key management i...
Fundamental limits of secret-key generation over a two-way, reciprocal and block fading wireless cha...
Abstract — Most of the existing work on key generation from wireless fading channels requires a dire...
Abstract — We study secret-key agreement with public discussion over a flat-fading wiretap channel m...
This paper investigates the problem of secret key generation over a wiretap channel when the termina...
Alice and Bob want to share a secret key and to communicate an independent message, both of which th...
Information Theory, IEEE Transactions on (revised)This paper investigates the problem of secret key ...
The broadcast nature of wireless communications imposes the risk of information leakage to adversari...
Abstract—Most of the existing work on key generation from wireless fading channels requires a direct...
Secret key generation from reciprocal multi-antenna channels is an interesting alternative to crypto...
This paper studies the problem of simultaneously generating a secret key (SK) and a private key (PK)...
Abstract—We study the generation of a secret key of maximum rate by a pair of terminals observing co...
Abstract—We study the capacity of secret-key agreement over a wiretap channel with state parameters....
We study secret-key agreement protocols over a wiretap channel controlled by a state parameter. The ...
Abstract—We design and analyze a method to extract secret keys from the randomness inherent to wirel...
In this paper, we present a secret key distribution protocol without resorting to a key management i...
Fundamental limits of secret-key generation over a two-way, reciprocal and block fading wireless cha...
Abstract — Most of the existing work on key generation from wireless fading channels requires a dire...
Abstract — We study secret-key agreement with public discussion over a flat-fading wiretap channel m...
This paper investigates the problem of secret key generation over a wiretap channel when the termina...
Alice and Bob want to share a secret key and to communicate an independent message, both of which th...
Information Theory, IEEE Transactions on (revised)This paper investigates the problem of secret key ...
The broadcast nature of wireless communications imposes the risk of information leakage to adversari...
Abstract—Most of the existing work on key generation from wireless fading channels requires a direct...
Secret key generation from reciprocal multi-antenna channels is an interesting alternative to crypto...
This paper studies the problem of simultaneously generating a secret key (SK) and a private key (PK)...
Abstract—We study the generation of a secret key of maximum rate by a pair of terminals observing co...
Abstract—We study the capacity of secret-key agreement over a wiretap channel with state parameters....
We study secret-key agreement protocols over a wiretap channel controlled by a state parameter. The ...
Abstract—We design and analyze a method to extract secret keys from the randomness inherent to wirel...
In this paper, we present a secret key distribution protocol without resorting to a key management i...