Noncoherent capacity of secret-key agreement with public discussion
dc.contributor.author | Agrawal, Anurag | |
dc.contributor.author | Rezki, Zouheir | |
dc.contributor.author | Khisti, Ashish J. | |
dc.contributor.author | Alouini, Mohamed-Slim | |
dc.date.accessioned | 2015-08-03T09:32:33Z | |
dc.date.available | 2015-08-03T09:32:33Z | |
dc.date.issued | 2011-09 | |
dc.identifier.citation | Agrawal, A., Rezki, Z., Khisti, A. J., & Alouini, M.-S. (2011). Noncoherent Capacity of Secret-Key Agreement With Public Discussion. IEEE Transactions on Information Forensics and Security, 6(3), 565–574. doi:10.1109/tifs.2011.2158999 | |
dc.identifier.issn | 15566013 | |
dc.identifier.doi | 10.1109/TIFS.2011.2158999 | |
dc.identifier.uri | http://hdl.handle.net/10754/561854 | |
dc.description.abstract | We study the noncoherent capacity of secret-key agreement with public discussion over independent identically distributed (i.i.d.) Rayleigh fading wireless channels, where neither the sender nor the receivers have access to instantaneous channel state information (CSI). We present two results. At high signal-to-noise ratio (SNR), the secret-key capacity is bounded in SNR, regardless of the number of antennas at each terminal. Second, for a system with a single antenna at both the legitimate and the eavesdropper terminals and an arbitrary number of transmit antennas, the secret-key capacity-achieving input distribution is discrete, with a finite number of mass points. Numerically we observe that at low SNR, the capacity achieving distribution has two mass points with one of them at the origin. © 2011 IEEE. | |
dc.publisher | Institute of Electrical and Electronics Engineers (IEEE) | |
dc.subject | Discrete input distribution | |
dc.subject | information theoretic security | |
dc.subject | Karush-Kuhn-Tucker (KKT) condition | |
dc.subject | noncoherent capacity | |
dc.subject | Rayleigh fading channels | |
dc.subject | secret-key agreement | |
dc.title | Noncoherent capacity of secret-key agreement with public discussion | |
dc.type | Article | |
dc.contributor.department | Communication Theory Lab | |
dc.contributor.department | Computer, Electrical and Mathematical Sciences and Engineering (CEMSE) Division | |
dc.contributor.department | Electrical Engineering Program | |
dc.contributor.department | Physical Science and Engineering (PSE) Division | |
dc.identifier.journal | IEEE Transactions on Information Forensics and Security | |
dc.contributor.institution | Department of Electrical Engineering, Indian Institute of Technology Bombay, Mumbai 400076, India | |
dc.contributor.institution | Electrical and Computer Engineering Department, University of Toronto, Toronto, ON, M5A 2N4, Canada | |
kaust.person | Rezki, Zouheir | |
kaust.person | Alouini, Mohamed-Slim |
This item appears in the following Collection(s)
-
Articles
-
Physical Science and Engineering (PSE) Division
For more information visit: http://pse.kaust.edu.sa/ -
Electrical and Computer Engineering Program
For more information visit: https://cemse.kaust.edu.sa/ece -
Communication Theory Lab
For more information visit: https://cemse.kaust.edu.sa/ctl -
Computer, Electrical and Mathematical Science and Engineering (CEMSE) Division
For more information visit: https://cemse.kaust.edu.sa/