Secure Broadcasting Using Independent Secret Keys

被引:24
作者
Schaefer, Rafael F. [1 ]
Khisti, Ashish [2 ]
Poor, H. Vincent [3 ]
机构
[1] Tech Univ Berlin, Informat Theory & Applicat Chair, D-10587 Berlin, Germany
[2] Univ Toronto, Dept Elect & Comp Engn, Toronto, ON M5S 3G4, Canada
[3] Princeton Univ, Dept Elect Engn, Princeton, NJ 08544 USA
基金
美国国家科学基金会;
关键词
Broadcast channel; common message; secret key; secrecy capacity; one-time pad; wiretap coding; fictitious messages; CAPACITY REGION; CHANNELS; COMMON;
D O I
10.1109/TCOMM.2017.2764892
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The problem of secure broadcasting with independent secret keys is studied. The particular scenario is analyzed in which a common message has to be broadcast to two legitimate receivers, while keeping an external eavesdropper ignorant of it. The transmitter shares independent secret keys of sufficiently high rates with both legitimate receivers, which can be used in different ways: they can be used as one-time pads to encrypt the common message, as fictitious messages for wiretap coding, or as a hybrid of these. In this paper, capacity results are established when the broadcast channels involving the three receivers are degraded. If both legitimate channels are degraded versions of the eavesdropper's channel, it is shown that the one-time pad approach is optimal for several cases, yielding corresponding capacity expressions. Alternatively, the wiretap coding approach is shown to be optimal if the eavesdropper's channel is degraded with respect to both legitimate channels, establishing capacity in this case as well. If the eavesdropper's channel is neither the strongest nor the weakest, an intricate scheme that carefully combines both concepts of one-time pad and wiretap coding with fictitious messages turns out to be capacity-achieving. Finally we also obtain some results for the general non-degraded broadcast channel.
引用
收藏
页码:644 / 661
页数:18
相关论文
共 37 条
  • [1] Ahlswede R, 2006, LECT NOTES COMPUT SC, V4123, P258
  • [2] [Anonymous], 2011, INFORM THEORY CODING, DOI DOI 10.1017/CBO9780511921889
  • [3] [Anonymous], 2014, 2014 INT C PROB METH
  • [4] [Anonymous], 2011, Network information theory
  • [5] [Anonymous], 1996, PROBLEMY PEREDACHI I
  • [6] [Anonymous], 2011, Physical-layer security:from information theory to security engineering, DOI DOI 10.1017/CBO9780511977985
  • [7] Wiretap Channel With Secure Rate-Limited Feedback
    Ardestanizadeh, Ehsan
    Franceschetti, Massimo
    Javidi, Tara
    Kim, Young-Han
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2009, 55 (12) : 5353 - 5361
  • [8] Secrecy results for compound wiretap channels
    Bjelakovic, I.
    Boche, H.
    Sommerfeld, J.
    [J]. PROBLEMS OF INFORMATION TRANSMISSION, 2013, 49 (01) : 73 - 98
  • [9] Bjelakovic I., 2011, IEEE Information Theory Workshop (ITW 2011), P60, DOI 10.1109/ITW.2011.6089569
  • [10] Strong Secrecy From Channel Resolvability
    Bloch, Matthieu R.
    Laneman, J. Nicholas
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2013, 59 (12) : 8077 - 8098