Strong secrecy and stealth for broadcast channels with confidential messages
@article{Bjelakovic2015StrongSA, title={Strong secrecy and stealth for broadcast channels with confidential messages}, author={Igor Bjelakovic and Jafar Mohammadi and Sławomir Stańczak}, journal={2016 IEEE International Symposium on Information Theory (ISIT)}, year={2015}, pages={2809-2813} }
This paper extends the weak secrecy results of Liu et al. for broadcast channels with two confidential messages to strong secrecy. Our results are based on an extension of the techniques developed by Hou and Kramer on bounding Kullback-Leibler divergence in the context of resolvability and effective secrecy.
Figures from this paper
References
SHOWING 1-10 OF 19 REFERENCES
Effective secrecy: Reliability, confusion and stealth
- Computer Science2014 IEEE International Symposium on Information Theory
- 2014
To measure stealth the authors use resolvability and relate this to binary hypothesis testing and results are developed for wire-tap channels and broadcast channels with confidential messages.
Discrete Memoryless Interference and Broadcast Channels With Confidential Messages: Secrecy Rate Regions
- Computer ScienceIEEE Transactions on Information Theory
- 2008
An encoding scheme in which transmitters dedicate some of their power to create artificial noise is proposed and shown to outperform both time-sharing and simple multiplexed transmission of the confidential messages.
Secrecy Capacity Region of a Multiple-Antenna Gaussian Broadcast Channel With Confidential Messages
- Computer ScienceIEEE Transactions on Information Theory
- 2009
Under this communication scenario, a secret dirty-paper coding scheme and the corresponding achievable secrecy rate region are first developed based on Gaussian codebooks and the secrecy capacity region of the MGBC-CM is established.
Strong Secrecy From Channel Resolvability
- Computer ScienceIEEE Transactions on Information Theory
- 2013
It is shown that at least for symmetric wiretap channels, random capacity- based constructions fail to achieve the strong secrecy capacity, while channel-resolvability-based constructions achieve it.
Broadcast channels with confidential messages
- Computer ScienceIEEE Trans. Inf. Theory
- 1978
Given two discrete memoryless channels (DMC's) with a common input, a single-letter characterization is given of the achievable triples where R_{e} is the equivocation rate and the related source-channel matching problem is settled.
Reliability and Secrecy Functions of the Wiretap Channel Under Cost Constraint
- Computer ScienceIEEE Transactions on Information Theory
- 2014
The notion of reliability and secrecy functions are newly introduced as a fundamental tool to analyze and/or design the performance of an efficient wiretap channel system, including binary symmetric wiretap channels, Poisson wiretaps channels, and Gaussian wiretAP channels.
A proof of Marton's coding theorem for the discrete memoryless broadcast channel
- Computer ScienceIEEE Trans. Inf. Theory
- 1981
A simple proof using random partitions and typicality is given for Marton's coding theorem for broadcast channels.
The wire-tap channel
- Computer ScienceThe Bell System Technical Journal
- 1975
This paper finds the trade-off curve between R and d, assuming essentially perfect (“error-free”) transmission, and implies that there exists a Cs > 0, such that reliable transmission at rates up to Cs is possible in approximately perfect secrecy.
The Strong Secret Key Rate of Discrete Random Triples
- Computer Science, Mathematics
- 1994
It is demonstrated that the known results for the secret key rate also hold for the stronger definition, and novel results on privacy amplification by Bennett, Brassard, Crepeau and Maurer are demonstrated.
Informational divergence approximations to product distributions
- Computer Science2013 13th Canadian Workshop on Information Theory
- 2013
The minimum rate needed to accurately approximate a product distribution based on an unnormalized informational divergence is shown to be a mutual information. This result subsumes results of Wyner…