Loading...

Analysis of Secret Key Agreement in The Channel Model with Side Information

Bahrami, Mohsen | 2013

1301 Viewed
  1. Type of Document: M.Sc. Thesis
  2. Language: Farsi
  3. Document No: 44826 (05)
  4. University: Sharif University of Technology
  5. Department: Electrical Engineering
  6. Advisor(s): Aref, Mohammad Reza
  7. Abstract:
  8. In this thesis, the problem of secret key agreement in the channel model with side information is studiedx. In order to investigate the problem, we consider three models according to the different ways of side information availability which are the state-dependent broadcast channel; the state-dependent broadcast channel in presence of public channel and the state-dependent wiretap channel with degraded versions of the channel state information.For the problem of secret key agreement in broadcast channels, two models, the state-dependent wiretap channel and state-dependent three receivers broadcast channel, are considered. We obtain inner and outer bounds of the secret key capacity region for the problem of secret key agreement in the state-dependent three receivers broadcast chan- nel. Furthermore, we show that the secret key capacity rate in the state-dependent wiretap channel can be deduced from the inner and outer bounds. Similar to the problem of secret key agreement in state-dependent broadcast channels, we discuss two models, state-dependent wiretap channel and state-dependent three receivers broadcast channel, for the problem of secret key agreement in state-dependent broadcast channels with public channel. We establish an inner bound on the pri-vate key capacity region for the state-dependent three receivers broad-cast channel with backward public channel. In addition, the secret key capacity rate of the state-dependent wiretap channel with public channel is obtained from the inner boundFinally, we study the problem of secret key agreement in state-dependent wiretap channels where the transmitter and the legitimate receiver ob-serve two degraded versions of the channel state, causally, and intend to share a secret key. For this setup, we obtain lower and upper bounds on the secret key capacity. In order to achieve the lower bound, common information of the degraded versions of the state is exploited
  9. Keywords:
  10. Information Theoretic Security ; Channel Model ; Wiretapper ; Secure Key Agreement ; Capacity Region ; Side Information

 Digital Object List

 Bookmark

...see more