Strong Secrecy of Arbitrarily Varying Wiretap Channel With Constraints

被引:3
作者
Chen, Yiqi [1 ,2 ]
He, Dan [3 ]
Ying, Chenhao [1 ,2 ]
Luo, Yuan [1 ,2 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, AI Inst, Shanghai 200240, Peoples R China
[2] Shanghai Jiao Tong Univ, MoE Key Lab Artificial Intelligence, AI Inst, Shanghai 200240, Peoples R China
[3] Intel Asia Pacific Res & Dev Ltd, Shanghai 200241, Peoples R China
基金
中国国家自然科学基金;
关键词
Codes; Encoding; Stochastic processes; Upper bound; Jamming; Noise measurement; Numerical models; Arbitrarily varying wiretap channel; stochastic-encoder code; state constraint; strong secrecy; BROADCAST CHANNELS; RANDOM CODES; CAPACITY; INFORMATION;
D O I
10.1109/TIT.2022.3161808
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The strong secrecy transmission problem of the arbitrarily varying wiretap channel (AVWC) with input and state constraints is investigated in this paper. First, a stochastic-encoder code lower bound of the strong secrecy capacity is established by applying the type argument and Csiszar's almost independent coloring lemma. Then, a superposition stochastic-encoder code lower bound of the secrecy capacity is provided. The superposition stochastic-encoder code lower bound can be larger than the ordinary stochastic-encoder code lower bound. Random code lower and upper bounds of the secrecy capacity of the AVWC with constraints are further provided. Based on these results, we further consider a special case of the model, namely severely less noisy AVWC, and give the stochastic-encoder code and random code capacities. It is proved that the stochastic-encoder code capacity of the AVWC with constraints is either equal to or strictly smaller than the corresponding random code capacity, which is consistent with the property of the ordinary AVC. Finally, some numerical examples are presented to better illustrate our capacity results. Compared to the soft covering lemma that requires the codewords to be generated i.i.d., our method has more relaxed requirements regarding codebooks. It is proved that the good codebooks for secure transmission can be generated by choosing codewords randomly from a given type set, which is critical when considering the AVWC with constraints.
引用
收藏
页码:4700 / 4722
页数:23
相关论文
共 33 条
[2]   ELIMINATION OF CORRELATION IN RANDOM CODES FOR ARBITRARILY VARYING CHANNELS [J].
AHLSWEDE, R .
ZEITSCHRIFT FUR WAHRSCHEINLICHKEITSTHEORIE UND VERWANDTE GEBIETE, 1978, 44 (02) :159-175
[3]  
[Anonymous], 2011, IEEE INF THEORY SOC
[4]  
[Anonymous], 2011, Information Theory: Coding Theorems for Discrete Memoryless Systems
[5]  
[Anonymous], 2012, Network Information Theory
[6]  
Bjelakovic Igor, 2013, Information Theory, Combinatorics, and Search Theory. In Memory of Rudolf Ahlswede, P123, DOI 10.1007/978-3-642-36899-8_5
[7]   THE CAPACITY OF A CLASS OF CHANNELS [J].
BLACKWELL, D ;
BREIMAN, L ;
THOMASIAN, AJ .
ANNALS OF MATHEMATICAL STATISTICS, 1959, 30 (04) :1229-1241
[8]   Strong Secrecy of Arbitrarily Varying Wiretap Channels with Constraints by Stochastic Code [J].
Chen, Yiqi ;
He, Dan ;
Ying, Chenhao ;
Luo, Yuan .
2021 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2021, :843-848
[9]   Strong Secrecy of Arbitrarily Varying Multiple Access Channels [J].
Chen, Yiqi ;
He, Dan ;
Luo, Yuan .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 :3662-3677
[10]  
CSISZAR I, 1978, IEEE T INFORM THEORY, V24, P339, DOI 10.1109/TIT.1978.1055892