Sciweavers

TIT
2010

Information-theoretic key agreement of multiple terminals: part I

13 years 7 months ago
Information-theoretic key agreement of multiple terminals: part I
This is the first part of a two-part paper on information-theoretically secure secret key agreement. In this part, we study the secrecy problem under the widely studied source model. In the source model the terminals wishing to generate a secret key, as well as the eavesdropper, receive the respective coordinates of a block of independent and identically distributed copies of jointly distributed random variables, after which the terminals are allowed interactive authenticated public communication, at the end of which each terminal should be able to generate the key. We derive a new upper bound on the secrecy capacity that strictly improves the currently best upper bound, due to Renner and Wolf. Further, while the RennerWolf bound is defined only in the case of two terminals, the new upper bound applies to the general multi-terminal case. The technique used for deriving our bound is to find certain properties of functions of joint probability distributions which will imply that they do...
Amin Aminzadeh Gohari, Venkat Anantharam
Added 22 May 2011
Updated 22 May 2011
Type Journal
Year 2010
Where TIT
Authors Amin Aminzadeh Gohari, Venkat Anantharam
Comments (0)