The key reconciliation stage in the secret key generation process may leak partial information to the eavesdropper through the public channel. In this thesis, two metrics, based on rate-distortion and entropy are considered to gauge the secrecy achievable with a channel scheme with side information at the receivers. Two theorems that provide bounds on the performance in this scenario according to different metrics are considered, and the resulting performance in terms of secret key rate is assessed.

The key reconciliation stage in the secret key generation process may leak partial information to the eavesdropper through the public channel. In this thesis, two metrics, based on rate-distortion and entropy are considered to gauge the secrecy achievable with a channel scheme with side information at the receivers. Two theorems that provide bounds on the performance in this scenario according to different metrics are considered, and the resulting performance in terms of secret key rate is assessed.

On secret-key agreement as source coding with side information

ARTICO, GIOVANNI
2022/2023

Abstract

The key reconciliation stage in the secret key generation process may leak partial information to the eavesdropper through the public channel. In this thesis, two metrics, based on rate-distortion and entropy are considered to gauge the secrecy achievable with a channel scheme with side information at the receivers. Two theorems that provide bounds on the performance in this scenario according to different metrics are considered, and the resulting performance in terms of secret key rate is assessed.
2022
On secret-key agreement as source coding with side information
The key reconciliation stage in the secret key generation process may leak partial information to the eavesdropper through the public channel. In this thesis, two metrics, based on rate-distortion and entropy are considered to gauge the secrecy achievable with a channel scheme with side information at the receivers. Two theorems that provide bounds on the performance in this scenario according to different metrics are considered, and the resulting performance in terms of secret key rate is assessed.
secret-key
key-generation
rate-distortion
entropy
File in questo prodotto:
File Dimensione Formato  
Artico_Giovanni.pdf

accesso aperto

Dimensione 558.52 kB
Formato Adobe PDF
558.52 kB Adobe PDF Visualizza/Apri

The text of this website © Università degli studi di Padova. Full Text are published under a non-exclusive license. Metadata are under a CC0 License

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.12608/52351