This paper investigates the problem of secret key generation over a wiretap channel when the terminals observe correlated sources. These sources are independent of the main channel and the users overhear them before the transmission takes place. A novel outer bound is proposed and, employing a previously reported inner bound, the secret key capacity is derived under certain less-noisy conditions on the channel or source components. This result improves upon the existing literature where the more stringent condition of degradedness is required. Furthermore, numerical evaluation of the achievable scheme and previously reported results for a binary model are presented; a comparison of the numerical bounds provides insights on the benefit of th...
International audienceThis paper investigates the secrecy capacity of the wiretap broadcast channel ...
Abstract—We consider the generation of common randomness (CR), secret or not secret, by two user ter...
We consider secret key agreement over the Gaussian two-way wiretap channel (GTWWC), where all the re...
This paper investigates the problem of secret key generation over a wiretap channel when the termina...
International audienceThis paper investigates the problem of secret key generation over a wiretap ch...
Abstract — We study secret-key agreement with public discussion over a flat-fading wiretap channel m...
Abstract—We consider the fundamental limits of the secret key generation problem when the sources ar...
Abstract—We study the capacity of secret-key agreement over a wiretap channel with state parameters....
Abstract—Shannon theoretic secret key generation by several parties is considered for models in whic...
The problem of simultaneously generating a secret key (SK) and private key (PK) pair among three ter...
Abstract—We revisit the problem of secret key agreement in channel models, where in addition to a no...
Alice and Bob want to share a secret key and to communicate an independent message, both of which th...
Abstract—Shannon theoretic shared secret key generation by multiple terminals is considered for a so...
International audienceWe investigate the possibility of covert and secret key generation over a disc...
International audienceThis paper investigates the secrecy capacity of the wiretap broadcast channel ...
Abstract—We consider the generation of common randomness (CR), secret or not secret, by two user ter...
We consider secret key agreement over the Gaussian two-way wiretap channel (GTWWC), where all the re...
This paper investigates the problem of secret key generation over a wiretap channel when the termina...
International audienceThis paper investigates the problem of secret key generation over a wiretap ch...
Abstract — We study secret-key agreement with public discussion over a flat-fading wiretap channel m...
Abstract—We consider the fundamental limits of the secret key generation problem when the sources ar...
Abstract—We study the capacity of secret-key agreement over a wiretap channel with state parameters....
Abstract—Shannon theoretic secret key generation by several parties is considered for models in whic...
The problem of simultaneously generating a secret key (SK) and private key (PK) pair among three ter...
Abstract—We revisit the problem of secret key agreement in channel models, where in addition to a no...
Alice and Bob want to share a secret key and to communicate an independent message, both of which th...
Abstract—Shannon theoretic shared secret key generation by multiple terminals is considered for a so...
International audienceWe investigate the possibility of covert and secret key generation over a disc...
International audienceThis paper investigates the secrecy capacity of the wiretap broadcast channel ...
Abstract—We consider the generation of common randomness (CR), secret or not secret, by two user ter...
We consider secret key agreement over the Gaussian two-way wiretap channel (GTWWC), where all the re...