1,664 research outputs found
Secure Multiplex Coding with Dependent and Non-Uniform Multiple Messages
The secure multiplex coding (SMC) is a technique to remove rate loss in the
coding for wire-tap channels and broadcast channels with confidential messages
caused by the inclusion of random bits into transmitted signals. SMC replaces
the random bits by other meaningful secret messages, and a collection of secret
messages serves as the random bits to hide the rest of messages. In the
previous researches, multiple secret messages were assumed to have independent
and uniform distributions, which is difficult to be ensured in practice. We
remove this restrictive assumption by a generalization of the channel
resolvability technique.
We also give practical construction techniques for SMC by using an arbitrary
given error-correcting code as an ingredient, and channel-universal coding of
SMC. By using the same principle as the channel-universal SMC, we give coding
for the broadcast channel with confidential messages universal to both channel
and source distributions.Comment: We made several changes to improve the presentatio
Universal Secure Multiplex Network Coding with Dependent and Non-Uniform Messages
We consider the random linear precoder at the source node as a secure network
coding. We prove that it is strongly secure in the sense of Harada and Yamamoto
and universal secure in the sense of Silva and Kschischang, while allowing
arbitrary small but nonzero mutual information to the eavesdropper. Our
security proof allows statistically dependent and non-uniform multiple secret
messages, while all previous constructions of weakly or strongly secure network
coding assumed independent and uniform messages, which are difficult to be
ensured in practice.Comment: 10 pages, 1 figure, IEEEtrans.cls. Online published in IEEE Trans.
Inform. Theor
Coding Schemes for Achieving Strong Secrecy at Negligible Cost
We study the problem of achieving strong secrecy over wiretap channels at
negligible cost, in the sense of maintaining the overall communication rate of
the same channel without secrecy constraints. Specifically, we propose and
analyze two source-channel coding architectures, in which secrecy is achieved
by multiplexing public and confidential messages. In both cases, our main
contribution is to show that secrecy can be achieved without compromising
communication rate and by requiring only randomness of asymptotically vanishing
rate. Our first source-channel coding architecture relies on a modified wiretap
channel code, in which randomization is performed using the output of a source
code. In contrast, our second architecture relies on a standard wiretap code
combined with a modified source code termed uniform compression code, in which
a small shared secret seed is used to enhance the uniformity of the source code
output. We carry out a detailed analysis of uniform compression codes and
characterize the optimal size of the shared seed.Comment: 15 pages, two-column, 5 figures, accepted to IEEE Transactions on
Information Theor
Message Randomization and Strong Security in Quantum Stabilizer-Based Secret Sharing for Classical Secrets
We improve the flexibility in designing access structures of quantum
stabilizer-based secret sharing schemes for classical secrets, by introducing
message randomization in their encoding procedures. We generalize the
Gilbert-Varshamov bound for deterministic encoding to randomized encoding of
classical secrets. We also provide an explicit example of a ramp secret sharing
scheme with which multiple symbols in its classical secret are revealed to an
intermediate set, and justify the necessity of incorporating strong security
criterion of conventional secret sharing. Finally, we propose an explicit
construction of strongly secure ramp secret sharing scheme by quantum
stabilizers, which can support twice as large classical secrets as the
McEliece-Sarwate strongly secure ramp secret sharing scheme of the same share
size and the access structure.Comment: Publisher's Open Access PDF. arXiv admin note: text overlap with
arXiv:1811.0521
Finite-Block-Length Analysis in Classical and Quantum Information Theory
Coding technology is used in several information processing tasks. In
particular, when noise during transmission disturbs communications, coding
technology is employed to protect the information. However, there are two types
of coding technology: coding in classical information theory and coding in
quantum information theory. Although the physical media used to transmit
information ultimately obey quantum mechanics, we need to choose the type of
coding depending on the kind of information device, classical or quantum, that
is being used. In both branches of information theory, there are many elegant
theoretical results under the ideal assumption that an infinitely large system
is available. In a realistic situation, we need to account for finite size
effects. The present paper reviews finite size effects in classical and quantum
information theory with respect to various topics, including applied aspects
Secure Multiplex Coding Over Interference Channel with Confidential Messages
In this paper, inner and outer bounds on the capacity region of two-user
interference channels with two confidential messages have been proposed. By
adding secure multiplex coding to the error correction method in [15] which
achieves the best achievable capacity region for interference channel up to
now, we have shown that the improved secure capacity region compared with [2]
now is the whole Han-Kobayashi region. In addition, this construction not only
removes the rate loss incurred by adding dummy messages to achieve security,
but also change the original weak security condition in [2] to strong security.
Then the equivocation rate for a collection of secret messages has also been
evaluated, when the length of the message is finite or the information rate is
high, our result provides a good approximation for bounding the worst case
equivocation rate. Our results can be readily extended to the Gaussian
interference channel with little efforts.Comment: 10 pages, 6 figure
Information-theoretic Physical Layer Security for Satellite Channels
Shannon introduced the classic model of a cryptosystem in 1949, where Eve has
access to an identical copy of the cyphertext that Alice sends to Bob. Shannon
defined perfect secrecy to be the case when the mutual information between the
plaintext and the cyphertext is zero. Perfect secrecy is motivated by
error-free transmission and requires that Bob and Alice share a secret key.
Wyner in 1975 and later I.~Csisz\'ar and J.~K\"orner in 1978 modified the
Shannon model assuming that the channels are noisy and proved that secrecy can
be achieved without sharing a secret key. This model is called wiretap channel
model and secrecy capacity is known when Eve's channel is noisier than Bob's
channel.
In this paper we review the concept of wiretap coding from the satellite
channel viewpoint. We also review subsequently introduced stronger secrecy
levels which can be numerically quantified and are keyless unconditionally
secure under certain assumptions. We introduce the general construction of
wiretap coding and analyse its applicability for a typical satellite channel.
From our analysis we discuss the potential of keyless information theoretic
physical layer security for satellite channels based on wiretap coding. We also
identify system design implications for enabling simultaneous operation with
additional information theoretic security protocols
- …