11,367 research outputs found
Secret-key Agreement with Channel State Information at the Transmitter
We study the capacity of secret-key agreement over a wiretap channel with
state parameters. The transmitter communicates to the legitimate receiver and
the eavesdropper over a discrete memoryless wiretap channel with a memoryless
state sequence. The transmitter and the legitimate receiver generate a shared
secret key, that remains secret from the eavesdropper. No public discussion
channel is available. The state sequence is known noncausally to the
transmitter. We derive lower and upper bounds on the secret-key capacity. The
lower bound involves constructing a common state reconstruction sequence at the
legitimate terminals and binning the set of reconstruction sequences to obtain
the secret-key. For the special case of Gaussian channels with additive
interference (secret-keys from dirty paper channel) our bounds differ by 0.5
bit/symbol and coincide in the high signal-to-noise-ratio and high
interference-to-noise-ratio regimes. For the case when the legitimate receiver
is also revealed the state sequence, we establish that our lower bound achieves
the the secret-key capacity. In addition, for this special case, we also
propose another scheme that attains the capacity and requires only causal side
information at the transmitter and the receiver.Comment: 10 Pages, Submitted to IEEE Transactions on Information Forensics and
Security, Special Issue on Using the Physical Layer for Securing the Next
Generation of Communication System
Modes of Information Flow
Information flow between components of a system takes many forms and is key
to understanding the organization and functioning of large-scale, complex
systems. We demonstrate three modalities of information flow from time series X
to time series Y. Intrinsic information flow exists when the past of X is
individually predictive of the present of Y, independent of Y's past; this is
most commonly considered information flow. Shared information flow exists when
X's past is predictive of Y's present in the same manner as Y's past; this
occurs due to synchronization or common driving, for example. Finally,
synergistic information flow occurs when neither X's nor Y's pasts are
predictive of Y's present on their own, but taken together they are. The two
most broadly-employed information-theoretic methods of quantifying information
flow---time-delayed mutual information and transfer entropy---are both
sensitive to a pair of these modalities: time-delayed mutual information to
both intrinsic and shared flow, and transfer entropy to both intrinsic and
synergistic flow. To quantify each mode individually we introduce our
cryptographic flow ansatz, positing that intrinsic flow is synonymous with
secret key agreement between X and Y. Based on this, we employ an
easily-computed secret-key-agreement bound---intrinsic mutual
information&mdashto quantify the three flow modalities in a variety of systems
including asymmetric flows and financial markets.Comment: 11 pages; 10 figures;
http://csc.ucdavis.edu/~cmg/compmech/pubs/ite.ht
Measurement-Based Noiseless Linear Amplification for Quantum Communication
Entanglement distillation is an indispensable ingredient in extended quantum
communication networks. Distillation protocols are necessarily
non-deterministic and require advanced experimental techniques such as
noiseless amplification. Recently it was shown that the benefits of noiseless
amplification could be extracted by performing a post-selective filtering of
the measurement record to improve the performance of quantum key distribution.
We apply this protocol to entanglement degraded by transmission loss of up to
the equivalent of 100km of optical fibre. We measure an effective entangled
resource stronger than that achievable by even a maximally entangled resource
passively transmitted through the same channel. We also provide a
proof-of-principle demonstration of secret key extraction from an otherwise
insecure regime. The measurement-based noiseless linear amplifier offers two
advantages over its physical counterpart: ease of implementation and near
optimal probability of success. It should provide an effective and versatile
tool for a broad class of entanglement-based quantum communication protocols.Comment: 7+3 pages, 5+1 figures, close to published versio
- …