Secret-key agreement with public discussion over multi-antenna transmitters with amplitude constraints

Zouheir Rezki, Mohamed Slim Alouini

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

8 Scopus citations

Abstract

We consider secret-key agreement with public discussion over a multiple-input single output (MISO) Gaussian channel with an amplitude constraint. We prove that the capacity is achieved by a discrete input, i.e., an input whose support is sparse. The proof follows from the concavity of the conditional mutual information in terms of the input distribution and hence the Karush-Kuhn-Tucker (KKT) condition provides a necessary and sufficient condition for optimality. Then, a contradiction argument that rules out the non-sparsity of any optimal input's support is utilized. The latter approach is essential to apply the identity theorem in a multidimensional setting as Rn is not an open subset of Cn.

Original languageEnglish (US)
Title of host publication2017 IEEE International Symposium on Information Theory, ISIT 2017
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages1534-1538
Number of pages5
ISBN (Electronic)9781509040964
DOIs
StatePublished - Aug 9 2017
Event2017 IEEE International Symposium on Information Theory, ISIT 2017 - Aachen, Germany
Duration: Jun 25 2017Jun 30 2017

Publication series

NameIEEE International Symposium on Information Theory - Proceedings
ISSN (Print)2157-8095

Conference

Conference2017 IEEE International Symposium on Information Theory, ISIT 2017
Country/TerritoryGermany
CityAachen
Period06/25/1706/30/17

Bibliographical note

Publisher Copyright:
© 2017 IEEE.

Keywords

  • Discrete input
  • Information-theoretic security
  • Karush-Kuhn-Tucker (KKT) conditions
  • Secret-key agreement

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Information Systems
  • Applied Mathematics
  • Modeling and Simulation

Fingerprint

Dive into the research topics of 'Secret-key agreement with public discussion over multi-antenna transmitters with amplitude constraints'. Together they form a unique fingerprint.

Cite this