The Wiretap Channel With Generalized Feedback: Secure Communication and Key Generation

被引:15
作者
Bassi, German [1 ,2 ]
Piantanida, Pablo [3 ,4 ]
Shamai , Shlomo [5 ]
机构
[1] Univ Paris Sud, CNRS, Cent Supelec, Lab Signaux & Syst,L2S,UMR 8506, F-91192 Gif Sur Yvette, France
[2] KTH Royal Inst Technol, Sch Elect Engn & Comp Sci, S-10044 Stockholm, Sweden
[3] Univ Paris Sud, CNRS, Cent Supelec French, Natl Ctr Sci Res, F-91192 Gif Sur Yvette, France
[4] Univ Montreal, MILA, Montreal, PQ H3T 1N8, Canada
[5] Technion Israel Inst Technol, Dept Elect Engn, IL-32000 Haifa, Israel
基金
欧盟地平线“2020”;
关键词
Information-theoretic security; wiretap channel; feedback; secret key; secrecy capacity; secret key capacity; MULTIPLE-ACCESS CHANNEL; COMMON RANDOMNESS; SECRECY; CAPACITIES; AGREEMENT; NOISELESS; REGION; 2-WAY;
D O I
10.1109/TIT.2018.2883299
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
It is a well-known fact that feedback does not increase the capacity of point-to-point memoryless channels, however, its effect in secure communications is not fully understood yet. In this paper, an achievable scheme for the wiretap channel with generalized feedback is presented. This scheme, which uses the feedback signal to generate a shared secret key between the legitimate users, encrypts the message to be sent at the bit level. New capacity results for a class of channels are provided, as well as some new insights into the secret key agreement problem. Moreover, this scheme recovers previously reported rate regions from the literature, and thus it can be seen as a generalization that unifies several results in the field.
引用
收藏
页码:2213 / 2233
页数:21
相关论文
共 39 条
  • [1] Ahlswede R, 2006, LECT NOTES COMPUT SC, V4123, P258
  • [2] COMMON RANDOMNESS IN INFORMATION-THEORY AND CRYPTOGRAPHY .1. SECRET SHARING
    AHLSWEDE, R
    CSISZAR, I
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1993, 39 (04) : 1121 - 1132
  • [3] [Anonymous], 2011, Physical-Layer Security:From Information Theory to Security Engineering, DOI DOI 10.1017/CBO9780511977985
  • [4] [Anonymous], 2016, WIRETAP CHANNELS RAN
  • [5] Wiretap Channel With Secure Rate-Limited Feedback
    Ardestanizadeh, Ehsan
    Franceschetti, Massimo
    Javidi, Tara
    Kim, Young-Han
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2009, 55 (12) : 5353 - 5361
  • [6] Bafghi HG, 2012, 2012 IEEE INFORMATION THEORY WORKSHOP (ITW), P657, DOI 10.1109/ITW.2012.6404759
  • [7] Bassi G., 2015, WIRETAP CHANNEL GENE
  • [8] Bassi G, 2015, 2015 IEEE INFORMATION THEORY WORKSHOP - FALL (ITW), P282, DOI 10.1109/ITWF.2015.7360780
  • [9] Bassi G, 2015, IEEE INT SYMP INFO, P1154, DOI 10.1109/ISIT.2015.7282636
  • [10] Cooperative Security at the Physical Layer [A summary of recent advances]
    Bassily, Raef
    Ekrem, Ersen
    He, Xiang
    Tekin, Ender
    Xie, Jianwei
    Bloch, Matthieu R.
    Ulukus, Sennur
    Yener, Aylin
    [J]. IEEE SIGNAL PROCESSING MAGAZINE, 2013, 30 (05) : 16 - 28