Key-Message Security over State-Dependent Wiretap Channels

被引:0
|
作者
Bunin, Alexander [1 ]
Goldfeld, Ziv [2 ]
Permuter, Haim H. [3 ]
Shamai, Shlomo [1 ]
Cuff, Paul [4 ]
Piantanida, Pablo [5 ]
机构
[1] Technion, Haifa, Israel
[2] MIT, Cambridge, MA 02139 USA
[3] Ben Gurion Univ Negev, Beer Sheva, Israel
[4] Princeton Univ, Princeton, NJ 08544 USA
[5] Cent Supelec, Chatenay Malabry, France
来源
2018 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT) | 2018年
基金
欧盟地平线“2020”; 以色列科学基金会; 美国国家科学基金会;
关键词
SIDE INFORMATION; COMMON RANDOMNESS; CRYPTOGRAPHY; CAPACITY;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The state-dependent (SD) wiretap channel (WTC) with non-causal channel state information (CSI) available at the encoder is considered. An inner bound on the trade-off region between admissible secret key (SK) and secret message (SM) rates is provided. The result is derived under the stringent semantic-security metric. Our inner bound recovers the best-known achievability results for either SK generation, SM transmission, or simultaneous execution of both. Since some of these past benchmarks were derived under weaker security metrics, our results imply that an upgrade to semantic-security is possible without inflicting any rate loss. It is shown that for certain instances of the considered SD-WTC, the derived region is strictly larger than the previously best-known SK-SM trade-off region reported by Prabhakaran et al., and that a recently reported SK rate for this setup cannot be achieved.
引用
收藏
页码:136 / 140
页数:5
相关论文
共 36 条
  • [1] Key and Message Semantic-Security Over State-Dependent Channels
    Bunin, Alexander
    Goldfeld, Ziv
    Permuter, Haim H.
    Shitz, Shlomo Shamai
    Cuff, Paul
    Piantanida, Pablo
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 (01) : 1541 - 1556
  • [2] Hierarchical Polar Coding for Achieving Secrecy Over State-Dependent Wiretap Channels Without Any Instantaneous CSI
    Si, Hongbo
    Koyluoglu, Onur Ozan
    Vishwanath, Sriram
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2016, 64 (09) : 3609 - 3623
  • [3] Message and Causal Asymmetric State Transmission Over the State-Dependent Degraded Broadcast Channel
    Bross, Shraga I.
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2020, 66 (06) : 3342 - 3365
  • [4] Asynchronous Transmission Over Single-User State-Dependent Channels
    Yemini, Michal
    Somekh-Baruch, Anelia
    Leshem, Amir
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2015, 61 (11) : 5854 - 5867
  • [5] Fundamental Limits of Communication Over State-Dependent Channels With Feedback
    Kovacevic, Mladen
    Wang, Carol
    Tan, Vincent Y. F.
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2019, 67 (05) : 3182 - 3191
  • [6] State-Dependent Channels with Composite State Information at the Encoder
    Khina, Anatoly
    Kesal, Mustafa
    Erez, Uri
    2011 IEEE INFORMATION THEORY WORKSHOP (ITW), 2011,
  • [7] On State-Dependent Degraded Broadcast Channels With Cooperation
    Dikstein, Lior
    Permuter, Haim H.
    Steinberg, Yossef
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2016, 62 (05) : 2308 - 2323
  • [8] Message and State Communication over Channels with Action Dependent States
    Ramachandran, Viswanathan
    Pillai, Sibi Raj B.
    Prabhakaran, Vinod M.
    2019 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2019, : 280 - 284
  • [9] On the security of transmissions over fading wiretap channels in realistic conditions
    Baldi, Marco
    Senigagliesi, Linda
    Chiaraluce, Franco
    2017 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2017,
  • [10] Feedback Enhances the Security of State-Dependent Degraded Broadcast Channels With Confidential Messages
    Dai, Bin
    Ma, Zheng
    Fang, Xuming
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (07) : 1529 - 1542