Semantically Secure Lattice Codes for the Gaussian Wiretap Channel

被引:107
作者
Ling, Cong [1 ]
Luzzi, Laura [1 ]
Belfiore, Jean-Claude [2 ]
Stehle, Damien [3 ]
机构
[1] Univ London Imperial Coll Sci Technol & Med, Dept Elect & Elect Engn, London SW7 2AZ, England
[2] Telecom ParisTech, Dept Commun & Elect, F-75739 Paris, France
[3] Ecole Normale Super Lyon, Lab Informat Parallelisme, F-69364 Lyon, France
关键词
Lattice coding; information theoretic security; strong secrecy; semantic security; wiretap channel; STRONG SECRECY; COSET CODES; INTERFERENCE; BOUNDS;
D O I
10.1109/TIT.2014.2343226
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We propose a new scheme of wiretap lattice coding that achieves semantic security and strong secrecy over the Gaussian wiretap channel. The key tool in our security proof is the flatness factor, which characterizes the convergence of the conditional output distributions corresponding to different messages and leads to an upper bound on the information leakage. We not only introduce the notion of secrecy-good lattices, but also propose the flatness factor as a design criterion of such lattices. Both the modulo-lattice Gaussian channel and genuine Gaussian channel are considered. In the latter case, we propose a novel secrecy coding scheme based on the discrete Gaussian distribution over a lattice, which achieves the secrecy capacity to within a half nat under mild conditions. No a priori distribution of the message is assumed, and no dither is used in our proposed schemes.
引用
收藏
页码:6399 / 6416
页数:18
相关论文
共 43 条
[31]   Decoding by Sampling: A Randomized Lattice Algorithm for Bounded Distance Decoding [J].
Liu, Shuiyin ;
Ling, Cong ;
Stehle, Damien .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2011, 57 (09) :5933-5945
[32]   Averaging bounds for lattices and linear codes [J].
Loeliger, HA .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1997, 43 (06) :1767-1773
[33]  
Luzzi L., 2011, P 5 INT ICST C PERF, P641
[34]   Achieving the Secrecy Capacity of Wiretap Channels Using Polar Codes [J].
Mahdavifar, Hessam ;
Vardy, Alexander .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2011, 57 (10) :6428-6443
[35]   Worst-case to average-case reductions based on Gaussian measures [J].
Micciancio, D ;
Regev, O .
45TH ANNUAL IEEE SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 2004, :372-381
[36]  
MICCIANCIO D, 2008, POSTQUANTUM CRYPROGR
[37]   Compute-and-Forward: Harnessing Interference Through Structured Codes [J].
Nazer, Bobak ;
Gastpar, Michael .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2011, 57 (10) :6463-6486
[38]   Secret Key Generation for Correlated Gaussian Sources [J].
Nitinawarat, Sirin ;
Narayan, Prakash .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2012, 58 (06) :3373-3391
[39]   ON CODING WITHOUT RESTRICTIONS FOR THE AWGN CHANNEL [J].
POLYTREV, G .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1994, 40 (02) :409-417
[40]   On Lattices, Learning with Errors, Random Linear Codes, and Cryptography [J].
Regev, Oded .
JOURNAL OF THE ACM, 2009, 56 (06)