The Wiretap Channel With Generalized Feedback: Secure Communication and Key Generation

被引:18
作者
Bassi, German [1 ,2 ]
Piantanida, Pablo [3 ,4 ]
Shamai , Shlomo [5 ]
机构
[1] Univ Paris Sud, CNRS, Cent Supelec, Lab Signaux & Syst,L2S,UMR 8506, F-91192 Gif Sur Yvette, France
[2] KTH Royal Inst Technol, Sch Elect Engn & Comp Sci, S-10044 Stockholm, Sweden
[3] Univ Paris Sud, CNRS, Cent Supelec French, Natl Ctr Sci Res, F-91192 Gif Sur Yvette, France
[4] Univ Montreal, MILA, Montreal, PQ H3T 1N8, Canada
[5] Technion Israel Inst Technol, Dept Elect Engn, IL-32000 Haifa, Israel
基金
欧盟地平线“2020”;
关键词
Information-theoretic security; wiretap channel; feedback; secret key; secrecy capacity; secret key capacity; MULTIPLE-ACCESS CHANNEL; COMMON RANDOMNESS; SECRECY; CAPACITIES; AGREEMENT; NOISELESS; REGION; 2-WAY;
D O I
10.1109/TIT.2018.2883299
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
It is a well-known fact that feedback does not increase the capacity of point-to-point memoryless channels, however, its effect in secure communications is not fully understood yet. In this paper, an achievable scheme for the wiretap channel with generalized feedback is presented. This scheme, which uses the feedback signal to generate a shared secret key between the legitimate users, encrypts the message to be sent at the bit level. New capacity results for a class of channels are provided, as well as some new insights into the secret key agreement problem. Moreover, this scheme recovers previously reported rate regions from the literature, and thus it can be seen as a generalization that unifies several results in the field.
引用
收藏
页码:2213 / 2233
页数:21
相关论文
共 39 条
[21]  
Gel'fand S. I., 1980, Problems of Control and Information Theory, V9, P19
[22]   Information-Theoretic Key Agreement of Multiple Terminals-Part II: Channel Model [J].
Gohari, Amin Aminzadeh ;
Anantharam, Venkat .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2010, 57 (08) :3997-4010
[23]  
Gohari AA, 2010, IEEE T INFORM THEORY, V57, P3973, DOI 10.1109/TIT.2010.2050832
[24]  
Gunduz D., 2008, P IEEE GLOBECOM, P1
[25]   The Role of Feedback in Two-Way Secure Communications [J].
He, Xiang ;
Yener, Aylin .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2013, 59 (12) :8115-8130
[26]   Secret-Key Generation Using Correlated Sources and Channels [J].
Khisti, Ashish ;
Diggavi, Suhas N. ;
Wornell, Gregory W. .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2012, 58 (02) :652-670
[27]   Secure Communications With Insecure Feedback: Breaking the High-SNR Ceiling [J].
Kim, Tung T. ;
Poor, H. Vincent .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2010, 57 (08) :3700-3711
[28]   The Wiretap Channel With Feedback: Encryption Over the Channel [J].
Lai, Lifeng ;
El Gamal, Hesham ;
Poor, H. Vincent .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (11) :5059-5067
[29]   Information Theoretic Security [J].
Liang, Yingbin ;
Poor, H. Vincent ;
Shamai, Shlomo .
FOUNDATIONS AND TRENDS IN COMMUNICATIONS AND INFORMATION THEORY, 2008, 5 (4-5) :355-580
[30]  
Liu W, 2007, CONFERENCE RECORD OF THE FORTY-FIRST ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS & COMPUTERS, VOLS 1-5, P893