Strong Secrecy From Channel Resolvability

被引:160
作者
Bloch, Matthieu R. [1 ,2 ]
Laneman, J. Nicholas [3 ]
机构
[1] Georgia Inst Technol, Sch Elect & Comp Engn, Atlanta, GA 30332 USA
[2] GT CNRS UMI 2958, Metz, France
[3] Univ Notre Dame, Dept Elect Engn, Notre Dame, IN 46556 USA
关键词
Channel resolvability; information-spectrum; information-theoretic security; secret-key agreement; wireless channels; wiretap channel; KEY AGREEMENT; INFORMATION; CAPACITY;
D O I
10.1109/TIT.2013.2283722
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We analyze physical-layer security based on the premise that the coding mechanism for secrecy over noisy channels is tied to the notion of channel resolvability. Instead of considering capacity-based constructions, which associate to each message a subcode that operates just below the capacity of the eavesdropper's channel, we consider channel-resolvability-based constructions, which associate to each message a subcode that operates just above the resolvability of the eavesdropper's channel. Building upon the work of Csiszar and Hayashi, we provide further evidence that channel resolvability is a powerful and versatile coding mechanism for secrecy by developing results that hold for strong secrecy metrics and arbitrary channels. Specifically, we show that at least for symmetric wiretap channels, random capacity-based constructions fail to achieve the strong secrecy capacity, while channel-resolvability-based constructions achieve it. We then leverage channel resolvability to establish the secrecy-capacity region of arbitrary broadcast channels with confidential messages and a cost constraint for strong secrecy metrics. Finally, we specialize our results to study the secrecy capacity of wireless channels with perfect channel state information (CSI), mixed channels, and compound channels with receiver CSI, as well as the secret-key capacity of source models for secret-key agreement. By tying secrecy to channel resolvability, we obtain achievable rates for strong secrecy metrics with simple proofs.
引用
收藏
页码:8077 / 8098
页数:22
相关论文
共 52 条
[1]   COMMON RANDOMNESS IN INFORMATION-THEORY AND CRYPTOGRAPHY .1. SECRET SHARING [J].
AHLSWEDE, R ;
CSISZAR, I .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1993, 39 (04) :1121-1132
[2]  
[Anonymous], 2011, INFORM THEORY CODING, DOI DOI 10.1017/CBO9780511921889
[3]  
[Anonymous], 2011, Physical-layer security:from information theory to security engineering, DOI DOI 10.1017/CBO9780511977985
[4]  
[Anonymous], P IEEE INT S INF THE
[5]  
[Anonymous], 2003, PROC 41 ANN ALLERTON
[6]  
[Anonymous], FDN TRENDS COMMUNICA
[7]  
Barros J, 2008, LECT NOTES COMPUT SC, V5155, P40
[8]   Generalized privacy amplification [J].
Bennett, CH ;
Brassard, G ;
Crepeau, C ;
Maurer, UM .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1995, 41 (06) :1915-1923
[9]  
Bjelakovic I., 2011, IEEE Information Theory Workshop (ITW 2011), P60, DOI 10.1109/ITW.2011.6089569
[10]   Channel Intrinsic Randomness [J].
Bloch, Matthieu .
2010 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, 2010, :2607-2611