11,367 research outputs found

    Secret-key Agreement with Channel State Information at the Transmitter

    Full text link
    We study the capacity of secret-key agreement over a wiretap channel with state parameters. The transmitter communicates to the legitimate receiver and the eavesdropper over a discrete memoryless wiretap channel with a memoryless state sequence. The transmitter and the legitimate receiver generate a shared secret key, that remains secret from the eavesdropper. No public discussion channel is available. The state sequence is known noncausally to the transmitter. We derive lower and upper bounds on the secret-key capacity. The lower bound involves constructing a common state reconstruction sequence at the legitimate terminals and binning the set of reconstruction sequences to obtain the secret-key. For the special case of Gaussian channels with additive interference (secret-keys from dirty paper channel) our bounds differ by 0.5 bit/symbol and coincide in the high signal-to-noise-ratio and high interference-to-noise-ratio regimes. For the case when the legitimate receiver is also revealed the state sequence, we establish that our lower bound achieves the the secret-key capacity. In addition, for this special case, we also propose another scheme that attains the capacity and requires only causal side information at the transmitter and the receiver.Comment: 10 Pages, Submitted to IEEE Transactions on Information Forensics and Security, Special Issue on Using the Physical Layer for Securing the Next Generation of Communication System

    Modes of Information Flow

    Get PDF
    Information flow between components of a system takes many forms and is key to understanding the organization and functioning of large-scale, complex systems. We demonstrate three modalities of information flow from time series X to time series Y. Intrinsic information flow exists when the past of X is individually predictive of the present of Y, independent of Y's past; this is most commonly considered information flow. Shared information flow exists when X's past is predictive of Y's present in the same manner as Y's past; this occurs due to synchronization or common driving, for example. Finally, synergistic information flow occurs when neither X's nor Y's pasts are predictive of Y's present on their own, but taken together they are. The two most broadly-employed information-theoretic methods of quantifying information flow---time-delayed mutual information and transfer entropy---are both sensitive to a pair of these modalities: time-delayed mutual information to both intrinsic and shared flow, and transfer entropy to both intrinsic and synergistic flow. To quantify each mode individually we introduce our cryptographic flow ansatz, positing that intrinsic flow is synonymous with secret key agreement between X and Y. Based on this, we employ an easily-computed secret-key-agreement bound---intrinsic mutual information&mdashto quantify the three flow modalities in a variety of systems including asymmetric flows and financial markets.Comment: 11 pages; 10 figures; http://csc.ucdavis.edu/~cmg/compmech/pubs/ite.ht

    Measurement-Based Noiseless Linear Amplification for Quantum Communication

    Full text link
    Entanglement distillation is an indispensable ingredient in extended quantum communication networks. Distillation protocols are necessarily non-deterministic and require advanced experimental techniques such as noiseless amplification. Recently it was shown that the benefits of noiseless amplification could be extracted by performing a post-selective filtering of the measurement record to improve the performance of quantum key distribution. We apply this protocol to entanglement degraded by transmission loss of up to the equivalent of 100km of optical fibre. We measure an effective entangled resource stronger than that achievable by even a maximally entangled resource passively transmitted through the same channel. We also provide a proof-of-principle demonstration of secret key extraction from an otherwise insecure regime. The measurement-based noiseless linear amplifier offers two advantages over its physical counterpart: ease of implementation and near optimal probability of success. It should provide an effective and versatile tool for a broad class of entanglement-based quantum communication protocols.Comment: 7+3 pages, 5+1 figures, close to published versio
    • …
    corecore