Communication for generating correlation: A unifying survey

M Sudan, H Tyagi, S Watanabe - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
The task of manipulating correlated random variables in a distributed setting has received
attention in the fields of both Information Theory and Computer Science. Often shared …

Multiterminal secrecy by public discussion

P Narayan, H Tyagi - Foundations and Trends® in …, 2016 - nowpublishers.com
This monograph describes principles of information theoretic secrecy generation by
legitimate parties with public discussion in the presence of an eavesdropper. The parties are …

Info-clustering: A mathematical theory for data clustering

C Chan, A Al-Bashabsheh, Q Zhou… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
We formulate an info-clustering paradigm based on a multivariate information measure,
called multivariate mutual information, that naturally extends Shannon's mutual information …

On the optimality of secret key agreement via omniscience

C Chan, M Mukherjee, N Kashyap… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
For the multiterminal secret key agreement problem under a private source model, it is
known that the maximum key rate, ie, the secrecy capacity, can be achieved through …

Upper bounds via lamination on the constrained secrecy capacity of hypergraphical sources

C Chan, M Mukherjee, N Kashyap… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Hypergraphical sources are a natural class of sources for secret key generation, within
which different subsets of terminals sharing secrets are allowed to discuss publicly in order …

Secret key agreement under discussion rate constraints

C Chan, M Mukherjee, N Kashyap… - 2017 IEEE International …, 2017 - ieeexplore.ieee.org
For the multiterminal secret key agreement problem, new single-letter lower bounds are
obtained on the minimum public discussion rate required to achieve any given secret key …

Multiterminal secret key agreement at asymptotically zero discussion rate

C Chan, M Mukherjee, N Kashyap… - 2018 IEEE International …, 2018 - ieeexplore.ieee.org
In the multiterminal secret key agreement problem, a set of users want to discuss with each
other until they share a common secret key independent of their discussion. We want to …

Information iterative retrieval of internet of things communication terminal based on symmetric algorithm

M Zhao - Wireless Personal Communications, 2021 - Springer
Through improved similarity analysis algorithm and hybrid local sensitivity hashing method,
information is summarized and retrieved by information retrieval method based on EPC …

Secret Key Agreement via Secure Omniscience

PK Vippathalla, C Chan, N Kashyap… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
In this paper, we explore the connection between secret key agreement and secure
omniscience within the setting of the multiterminal source model with an eavesdropper …

When is omniscience a rate-optimal strategy for achieving secret key capacity?

C Chan, M Mukherjee, N Kashyap… - 2016 IEEE Information …, 2016 - ieeexplore.ieee.org
For the multiterminal secret key agreement problem under a private source model, it is
known that the communication complexity required to achieve the capacity can be strictly …