openThe key reconciliation stage in the secret key generation process may leak partial information to the eavesdropper through the public channel. In this thesis, two metrics, based on rate-distortion and entropy are considered to gauge the secrecy achievable with a channel scheme with side information at the receivers. Two theorems that provide bounds on the performance in this scenario according to different metrics are considered, and the resulting performance in terms of secret key rate is assessed.The key reconciliation stage in the secret key generation process may leak partial information to the eavesdropper through the public channel. In this thesis, two metrics, based on rate-distortion and entropy are considered to gauge the secre...
We report on a highly efficient information reconciliation protocol for the binary symmetric channel...
In this work, secrecy in communication systems is measured by the distortion that an adversary incur...
We study secret-key agreement protocols over a wiretap channel controlled by a state parameter. The ...
Information reconciliation allows two parties knowing correlated random variables, such as a noisy v...
Abstract—For a discrete or a continuous source model, we study the problem of secret-key generation ...
Quantum key distribution performs the trick of growing a secret key in two distant places connected ...
International audienceThis paper investigates the problem of source-channel coding for secure transm...
Abstract—In this work, secrecy in communication systems is measured by the distortion incurred by th...
Abstract—We study the capacity of secret-key agreement over a wiretap channel with state parameters....
International audienceWe investigate the possibility of covert and secret key generation over a disc...
Alice and Bob want to share a secret key and to communicate an independent message, both of which th...
The classical secret-key agreement (SKA) scheme includes three phases: (a) advantage distillation (A...
Information-theoretically secure secret-key agreement between two parties Alice and Bob is a well-st...
Secret key agreement protocol between legal parties based on reconciliation and privacy amplificatio...
We extend the problem of secure source coding by considering a remote source whose noisy measurement...
We report on a highly efficient information reconciliation protocol for the binary symmetric channel...
In this work, secrecy in communication systems is measured by the distortion that an adversary incur...
We study secret-key agreement protocols over a wiretap channel controlled by a state parameter. The ...
Information reconciliation allows two parties knowing correlated random variables, such as a noisy v...
Abstract—For a discrete or a continuous source model, we study the problem of secret-key generation ...
Quantum key distribution performs the trick of growing a secret key in two distant places connected ...
International audienceThis paper investigates the problem of source-channel coding for secure transm...
Abstract—In this work, secrecy in communication systems is measured by the distortion incurred by th...
Abstract—We study the capacity of secret-key agreement over a wiretap channel with state parameters....
International audienceWe investigate the possibility of covert and secret key generation over a disc...
Alice and Bob want to share a secret key and to communicate an independent message, both of which th...
The classical secret-key agreement (SKA) scheme includes three phases: (a) advantage distillation (A...
Information-theoretically secure secret-key agreement between two parties Alice and Bob is a well-st...
Secret key agreement protocol between legal parties based on reconciliation and privacy amplificatio...
We extend the problem of secure source coding by considering a remote source whose noisy measurement...
We report on a highly efficient information reconciliation protocol for the binary symmetric channel...
In this work, secrecy in communication systems is measured by the distortion that an adversary incur...
We study secret-key agreement protocols over a wiretap channel controlled by a state parameter. The ...