Optimal rate-limited secret key generation from Gaussian sources using lattices

L Luzzi, C Ling, MR Bloch - IEEE Transactions on Information …, 2023 - ieeexplore.ieee.org
We propose a lattice-based scheme for secret key generation from Gaussian sources in the
presence of an eavesdropper, and show that it achieves the strong secret key capacity in the …

Multiterminal secret key agreement at asymptotically zero discussion rate

C Chan, M Mukherjee, N Kashyap… - 2018 IEEE International …, 2018 - ieeexplore.ieee.org
In the multiterminal secret key agreement problem, a set of users want to discuss with each
other until they share a common secret key independent of their discussion. We want to …

Secret key generation from Gaussian sources using lattice-based extractors

L Luzzi, C Ling, MR Bloch - Cryptology ePrint Archive, 2022 - eprint.iacr.org
We propose a lattice-based scheme for secret key generation from Gaussian sources in the
presence of an eavesdropper, and show that it achieves the strong secret key capacity in the …

Secret Key Agreement via Secure Omniscience

PK Vippathalla, C Chan, N Kashyap… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
In this paper, we explore the connection between secret key agreement and secure
omniscience within the setting of the multiterminal source model with an eavesdropper …

Secret key agreement and secure omniscience of tree-PIN source with linear wiretapper

PK Vippathalla, C Chan, N Kashyap… - 2021 IEEE International …, 2021 - ieeexplore.ieee.org
In this paper, we obtain a single-letter characterization of the wiretap secret key capacity for
a large class of multiterminal source models (namely, tree-PIN models) with a linear …

Positivity of secret key capacity for hypergraphical sources with a linear wiretapper

PK Vippathalla, C Chan, N Kashyap… - 2022 IEEE Information …, 2022 - ieeexplore.ieee.org
The characterization of the secret key capacity with wiretapper side information is a
challenging open problem. In this paper, we give a necessary and sufficient condition for the …

Secret key generation for minimally connected hypergraphical sources

Q Zhou, C Chan - IEEE Transactions on Information Theory, 2020 - ieeexplore.ieee.org
This paper investigates the secret key generation in the multiterminal source model, where
users observing correlated sources discuss interactively under limited rates to agree on a …

Wiretap secret key agreement via secure omniscience

PK Vippathalla, C Chan, N Kashyap, Q Zhou - arXiv preprint arXiv …, 2021 - arxiv.org
In this paper, we explore the connection between secret key agreement and secure
omniscience within the setting of the multiterminal source model with a wiretapper who has …

One-shot perfect secret key agreement for finite linear sources

C Chan, N Kashyap, PK Vippathalla… - 2019 IEEE International …, 2019 - ieeexplore.ieee.org
We consider a non-asymptotic (one-shot) version of the multiterminal secret key agreement
problem on a finite linear source model. In this model, the observation of each terminal is a …

On the discussion rate region for the PIN model

Q Zhou, C Chan, RW Yeung - 2020 IEEE International …, 2020 - ieeexplore.ieee.org
The discussion rate region in the multiterminal source model is the individual discussion rate
required for generating a secret key of maximum rate. We give an explicit single-letter …