Secret Key Generation from Dependent Source, part 2

Amin Gohari (Chinese University of Hong Kong)

Wed Jan 31, 10:00-11:15 (10 months ago)

Abstract: We consider the problem of extracting a secret key from dependent sources. In this problem, the legitimate terminals observe iid repetition of correlated random variables and wish to create a shared secret key that is secure from a passive eavesdropper using a noiseless public communication channel. Finding the maximum achievable key rate is a fundamental open problem in information-theoretic security. We review the history and the state-of-the-art results for this problem, with an emphasis on the speaker's prior work on this problem. Certain extensions of the problem will also be discussed.

Computer scienceMathematics

Audience: researchers in the discipline


Seminar on Algorithmic Aspects of Information Theory

Series comments: This online seminar is a follow up of the Dagstuhl Seminar 22301, www.dagstuhl.de/en/program/calendar/semhp/?semnr=22301.

Organizer: Andrei Romashchenko*
*contact for this listing

Export talk to