825 research outputs found
The Sender-Excited Secret Key Agreement Model: Capacity, Reliability and Secrecy Exponents
We consider the secret key generation problem when sources are randomly
excited by the sender and there is a noiseless public discussion channel. Our
setting is thus similar to recent works on channels with action-dependent
states where the channel state may be influenced by some of the parties
involved. We derive single-letter expressions for the secret key capacity
through a type of source emulation analysis. We also derive lower bounds on the
achievable reliability and secrecy exponents, i.e., the exponential rates of
decay of the probability of decoding error and of the information leakage.
These exponents allow us to determine a set of strongly-achievable secret key
rates. For degraded eavesdroppers the maximum strongly-achievable rate equals
the secret key capacity; our exponents can also be specialized to previously
known results.
In deriving our strong achievability results we introduce a coding scheme
that combines wiretap coding (to excite the channel) and key extraction (to
distill keys from residual randomness). The secret key capacity is naturally
seen to be a combination of both source- and channel-type randomness. Through
examples we illustrate a fundamental interplay between the portion of the
secret key rate due to each type of randomness. We also illustrate inherent
tradeoffs between the achievable reliability and secrecy exponents. Our new
scheme also naturally accommodates rate limits on the public discussion. We
show that under rate constraints we are able to achieve larger rates than those
that can be attained through a pure source emulation strategy.Comment: 18 pages, 8 figures; Submitted to the IEEE Transactions on
Information Theory; Revised in Oct 201
Secure Multiplex Coding with Dependent and Non-Uniform Multiple Messages
The secure multiplex coding (SMC) is a technique to remove rate loss in the
coding for wire-tap channels and broadcast channels with confidential messages
caused by the inclusion of random bits into transmitted signals. SMC replaces
the random bits by other meaningful secret messages, and a collection of secret
messages serves as the random bits to hide the rest of messages. In the
previous researches, multiple secret messages were assumed to have independent
and uniform distributions, which is difficult to be ensured in practice. We
remove this restrictive assumption by a generalization of the channel
resolvability technique.
We also give practical construction techniques for SMC by using an arbitrary
given error-correcting code as an ingredient, and channel-universal coding of
SMC. By using the same principle as the channel-universal SMC, we give coding
for the broadcast channel with confidential messages universal to both channel
and source distributions.Comment: We made several changes to improve the presentatio
Expurgated Bounds for the Asymmetric Broadcast Channel
This work contains two main contributions concerning the expurgation of
hierarchical ensembles for the asymmetric broadcast channel. The first is an
analysis of the optimal maximum likelihood (ML) decoders for the weak and
strong user. Two different methods of code expurgation will be used, that will
provide two competing error exponents. The second is the derivation of
expurgated exponents under the generalized stochastic likelihood decoder (GLD).
We prove that the GLD exponents are at least as tight as the maximum between
the random coding error exponents derived in an earlier work by Averbuch and
Merhav (2017) and one of our ML-based expurgated exponents. By that, we
actually prove the existence of hierarchical codebooks that achieve the best of
the random coding exponent and the expurgated exponent simultaneously for both
users
- …