Secret key generation at two terminals is considered. Each terminal observes one of the outputs of a source with two correlated components. One terminal can send a helper message to the second terminal via a noiseless public channel. It is assumed that this message or the privacy leakage respectively is rate constrained. The maximum secret key rate, that can be achieved such that the key is uniformly distributed and meets the perfect secrecy requirement, is determined. Corresponding results are established for different source models, comprising a compound model and various jamming scenarios.
«
Secret key generation at two terminals is considered. Each terminal observes one of the outputs of a source with two correlated components. One terminal can send a helper message to the second terminal via a noiseless public channel. It is assumed that this message or the privacy leakage respectively is rate constrained. The maximum secret key rate, that can be achieved such that the key is uniformly distributed and meets the perfect secrecy requirement, is determined. Corresponding results are...
»