A mutual dependence expression is established for the secret key agreement problem when all users are active. In certain source networks, the expression can be interpreted as certain notions of connectivity and network information flow. In particular, the secrecy problem can be mapped to a new class of network coding problems with selectable links and undirected broadcast links. For such networks, the secrecy capacities serve as upper bounds on the maximum network throughputs, while the network coding solutions can be used for secret key agreement.Chinese University of Hong Kong. Shun Hing Institute of Advanced Engineering (Project. #MMT-p2-09
Abstract—We revisit the problem of secret key agreement in channel models, where in addition to a no...
In the multiterminal secret key agreement problem, a set of users want to discuss with each other un...
Abstract—We study secret-key agreement protocols over a wiretap channel controlled by a state parame...
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer...
We consider secret key agreement over the Gaussian two-way wiretap channel (GTWWC), where all the re...
The multiterminal secret key agreement problem by public discussion is formulated with an additional...
We consider information theoretic secret key (SK) agreement and secure function computation by multi...
For the multiterminal secret key agreement problem, new single-letter lower bounds are obtained on t...
We study secret-key agreement protocols over a wiretap channel controlled by a state parameter. The ...
We revisit the problem of secret key agreement using interactive public communication for two partie...
Abstract—Shannon theoretic shared secret key generation by multiple terminals is considered for a so...
Abstract—A secret key agreement setup between three users is considered in which each of the users 1...
Fundamental limits of secret-key generation over a two-way, reciprocal and block fading wireless cha...
Communication networks have had a transformative impact on our society as they have revolutionized a...
For a multi-source multi-terminal noiseless network, the key-dissemination problem involves the task...
Abstract—We revisit the problem of secret key agreement in channel models, where in addition to a no...
In the multiterminal secret key agreement problem, a set of users want to discuss with each other un...
Abstract—We study secret-key agreement protocols over a wiretap channel controlled by a state parame...
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer...
We consider secret key agreement over the Gaussian two-way wiretap channel (GTWWC), where all the re...
The multiterminal secret key agreement problem by public discussion is formulated with an additional...
We consider information theoretic secret key (SK) agreement and secure function computation by multi...
For the multiterminal secret key agreement problem, new single-letter lower bounds are obtained on t...
We study secret-key agreement protocols over a wiretap channel controlled by a state parameter. The ...
We revisit the problem of secret key agreement using interactive public communication for two partie...
Abstract—Shannon theoretic shared secret key generation by multiple terminals is considered for a so...
Abstract—A secret key agreement setup between three users is considered in which each of the users 1...
Fundamental limits of secret-key generation over a two-way, reciprocal and block fading wireless cha...
Communication networks have had a transformative impact on our society as they have revolutionized a...
For a multi-source multi-terminal noiseless network, the key-dissemination problem involves the task...
Abstract—We revisit the problem of secret key agreement in channel models, where in addition to a no...
In the multiterminal secret key agreement problem, a set of users want to discuss with each other un...
Abstract—We study secret-key agreement protocols over a wiretap channel controlled by a state parame...