Secret-key sharing based on layered broadcast coding over fading channels

Xiaojun Tang, Ruoheng Liu, Predrag Spasojević, H. Vincent Poor

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Scopus citations

Abstract

A secret-key sharing strategy based on layered broadcast coding is introduced for slow fading channels. In the model considered, Alice wants to share a key with Bob while keeping the key secret from a passive eavesdropper, Eve. Both Alice-Bob and Alice-Eve channels are assumed to undergo slow fading, and perfect channel state information (CSI) is assumed to be known only at the receivers during the transmission. Layered coding facilitates adapting the reliably decoded rate at Bob to the actual channel state without CSI available at Alice. The index of a reliably decoded layer is sent back to Alice via a public and error-free channel, which is exploited by Alice and Bob to generate the secret key. In this paper, the secrecy key rate is derived. In addition, the optimal power distribution over coded layers is characterized. It is shown that layered coding can increase the secrecy key rate significantly compared with single-level coding.

Original languageEnglish (US)
Title of host publication2009 IEEE International Symposium on Information Theory, ISIT 2009
Pages2762-2766
Number of pages5
DOIs
StatePublished - 2009
Event2009 IEEE International Symposium on Information Theory, ISIT 2009 - Seoul, Korea, Republic of
Duration: Jun 28 2009Jul 3 2009

Publication series

NameIEEE International Symposium on Information Theory - Proceedings
ISSN (Print)2157-8102

Other

Other2009 IEEE International Symposium on Information Theory, ISIT 2009
Country/TerritoryKorea, Republic of
CitySeoul
Period6/28/097/3/09

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Information Systems
  • Modeling and Simulation
  • Applied Mathematics

Fingerprint

Dive into the research topics of 'Secret-key sharing based on layered broadcast coding over fading channels'. Together they form a unique fingerprint.

Cite this