Alice and Bob want to share a secret key and to communicate an independent message, both of which they desire to be kept secret from an eavesdropper Eve. We study this problem of secret communication and secret key generation when two resources are available – correlated sources at Alice, Bob, and Eve, and a noisy broadcast channel from Alice to Bob and Eve which is independent of the sources. No other resource, in particular, no other channel is available. We are interested in characterizing the fundamental trade-off between the rates of the secret message and secret key. We present an achievable solution based on a separation architecture and prove its optimality for the parallel channels and sources case when each sub-channel and source ...
Abstract—We revisit the problem of secret key agreement in channel models, where in addition to a no...
. The problem of generating a shared secret key S by two parties knowing dependent random variables ...
Abstract—We study the generation of a secret key of maximum rate by a pair of terminals observing co...
A transmission between two agents, Alice and Bob, over a set of parallel sub-channels is overheard b...
International audienceThis paper considers the setup of Alice, Bob and Eve sharing a Gaussian Broadc...
International audienceThis paper investigates the problem of secret key generation over a wiretap ch...
Consider a scenario in which two parties Alice and Bob as well as an opponent Eve receive the output...
Abstract—The problem of secure broadcasting with indepen-dent secret keys is studied. The particular...
Abstract—Shannon theoretic secret key generation by several parties is considered for models in whic...
International audienceThis paper investigates the problem of secret key generation over a wiretap ch...
Abstract—In this work, secrecy in communication systems is measured by the distortion incurred by th...
Abstract—We study information-theoretic security for discrete memoryless interference and broadcast ...
Abstract—We study a two-terminal secret-key generation problem over a two-way, approximately recipro...
This thesis examines the challenges of information-theoretic secret communication that exploits the ...
Abstract — We study secret-key agreement with public discussion over a flat-fading wiretap channel m...
Abstract—We revisit the problem of secret key agreement in channel models, where in addition to a no...
. The problem of generating a shared secret key S by two parties knowing dependent random variables ...
Abstract—We study the generation of a secret key of maximum rate by a pair of terminals observing co...
A transmission between two agents, Alice and Bob, over a set of parallel sub-channels is overheard b...
International audienceThis paper considers the setup of Alice, Bob and Eve sharing a Gaussian Broadc...
International audienceThis paper investigates the problem of secret key generation over a wiretap ch...
Consider a scenario in which two parties Alice and Bob as well as an opponent Eve receive the output...
Abstract—The problem of secure broadcasting with indepen-dent secret keys is studied. The particular...
Abstract—Shannon theoretic secret key generation by several parties is considered for models in whic...
International audienceThis paper investigates the problem of secret key generation over a wiretap ch...
Abstract—In this work, secrecy in communication systems is measured by the distortion incurred by th...
Abstract—We study information-theoretic security for discrete memoryless interference and broadcast ...
Abstract—We study a two-terminal secret-key generation problem over a two-way, approximately recipro...
This thesis examines the challenges of information-theoretic secret communication that exploits the ...
Abstract — We study secret-key agreement with public discussion over a flat-fading wiretap channel m...
Abstract—We revisit the problem of secret key agreement in channel models, where in addition to a no...
. The problem of generating a shared secret key S by two parties knowing dependent random variables ...
Abstract—We study the generation of a secret key of maximum rate by a pair of terminals observing co...