An overview of information-theoretic security and privacy: Metrics, limits and applications

M Bloch, O Günlü, A Yener, F Oggier… - IEEE Journal on …, 2021 - ieeexplore.ieee.org
This tutorial reviews fundamental contributions to information security. An integrative
viewpoint is taken that explains the security metrics, including secrecy, privacy, and others …

Multivariate mutual information inspired by secret-key agreement

C Chan, A Al-Bashabsheh, JB Ebrahimi… - Proceedings of the …, 2015 - ieeexplore.ieee.org
The capacity for multiterminal secret-key agreement inspires a natural generalization of
Shannon's mutual information from two random variables to multiple random variables …

Info-clustering: A mathematical theory for data clustering

C Chan, A Al-Bashabsheh, Q Zhou… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
We formulate an info-clustering paradigm based on a multivariate information measure,
called multivariate mutual information, that naturally extends Shannon's mutual information …

Cooperative group secret key generation based on secure network coding

S **ao, Y Guo, K Huang, L ** - IEEE Communications Letters, 2018 - ieeexplore.ieee.org
Most of the existing works on group secret key (GSK) generation are based on pairwise key
which wasting the total time and power of the group users. We present a cooperative GSK …

Coding for positive rate in the source model key agreement problem

A Gohari, O Günlü, G Kramer - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
A two-party key agreement problem with public discussion, known as the source model
problem, is considered. By relating key agreement to hypothesis testing, a new coding …

Optimal rate-limited secret key generation from Gaussian sources using lattices

L Luzzi, C Ling, MR Bloch - IEEE Transactions on Information …, 2023 - ieeexplore.ieee.org
We propose a lattice-based scheme for secret key generation from Gaussian sources in the
presence of an eavesdropper, and show that it achieves the strong secret key capacity in the …

Secret key generation from Gaussian sources using lattice-based extractors

L Luzzi, C Ling, MR Bloch - Cryptology ePrint Archive, 2022 - eprint.iacr.org
We propose a lattice-based scheme for secret key generation from Gaussian sources in the
presence of an eavesdropper, and show that it achieves the strong secret key capacity in the …

On the Source Model Key Agreement Problem

H Abin, A Gohari - arxiv preprint arxiv:2502.00294, 2025 - arxiv.org
We consider the source model key agreement problem involving two legitimate parties and
an eavesdropper who observe n iid samples of X and Y and Z respectively. The best-known …

Multiple Key-cast over Networks

M Langberg, M Effros - arxiv preprint arxiv:2302.03524, 2023 - arxiv.org
The multicast key-dissemination problem over noiseless networks, introduced by Langberg
and Effros [ITW 2022], here called the``key-cast''problem, captures the task of disseminating …

Multi-party secret key agreement over state-dependent wireless broadcast channels

MJ Siavoshani, S Mishra, C Fragouli… - IEEE transactions on …, 2016 - ieeexplore.ieee.org
We consider a group of m trusted and authenticated nodes that aim to create a shared secret
key K over a wireless channel in the presence of an eavesdropper Eve. We assume that …