The Diversity-Multiplexing Tradeoff of Secret-Key Agreement over Multiple-Antenna Channels

Marwen Zorgui, Zouheir Rezki, Basel Alomair, Mohamed-Slim Alouini

Research output: Contribution to journalArticlepeer-review

4 Scopus citations

Abstract

We study the problem of secret-key agreement between two legitimate parties, Alice and Bob, in presence an of eavesdropper Eve. There is a public channel with unlimited capacity that is available to the legitimate parties and is also observed by Eve. Our focus is on Rayleigh fading quasi-static channels. The legitimate receiver and the eavesdropper are assumed to have perfect channel knowledge of their channels. We study the system in the high-power regime. First, we define the secret-key diversity gain and the secret-key multiplexing gain. Second, we establish the secret-key diversity multiplexing tradeoff (DMT) under no channel state information (CSI) at the transmitter (CSI-T). The eavesdropper is shown to “steal” only transmit antennas. We show that, likewise the DMT without secrecy constraint, the secret-key DMT is the same either with or without full channel state information at the transmitter. This insensitivity of secret-key DMT toward CSI-T features a fundamental difference between secret-key agreement and the wiretap channel, in which secret DMT depends heavily on CSI-T. Finally, we present several secret-key DMT-achieving schemes in case of full CSI-T. We argue that secret DMT-achieving schemes are also key DMT-achieving. Moreover, we show formally that artificial noise (AN), likewise zero-forcing (ZF), is DMT-achieving. We also show that the public feedback channel improves the outage performance without having any effect on the DMT.
Original languageEnglish (US)
Pages (from-to)1562-1574
Number of pages13
JournalIEEE Transactions on Wireless Communications
Volume15
Issue number2
DOIs
StatePublished - Oct 20 2015

Bibliographical note

KAUST Repository Item: Exported on 2020-10-01

Fingerprint

Dive into the research topics of 'The Diversity-Multiplexing Tradeoff of Secret-Key Agreement over Multiple-Antenna Channels'. Together they form a unique fingerprint.

Cite this