15 research outputs found
Strong Converse for a Degraded Wiretap Channel via Active Hypothesis Testing
We establish an upper bound on the rate of codes for a wiretap channel with
public feedback for a fixed probability of error and secrecy parameter. As a
corollary, we obtain a strong converse for the capacity of a degraded wiretap
channel with public feedback. Our converse proof is based on a reduction of
active hypothesis testing for discriminating between two channels to coding for
wiretap channel with feedback.Comment: This paper was presented at Allerton 201
Partial Strong Converse for the Non-Degraded Wiretap Channel
We prove the partial strong converse property for the discrete memoryless
\emph{non-degraded} wiretap channel, for which we require the leakage to the
eavesdropper to vanish but allow an asymptotic error probability to the legitimate receiver. We show that when the transmission rate is
above the secrecy capacity, the probability of correct decoding at the
legitimate receiver decays to zero exponentially. Therefore, the maximum
transmission rate is the same for , and the partial strong
converse property holds. Our work is inspired by a recently developed technique
based on information spectrum method and Chernoff-Cramer bound for evaluating
the exponent of the probability of correct decoding
"Pretty strong" converse for the private capacity of degraded quantum wiretap channels
In the vein of the recent "pretty strong" converse for the quantum and
private capacity of degradable quantum channels [Morgan/Winter, IEEE Trans.
Inf. Theory 60(1):317-333, 2014], we use the same techniques, in particular the
calculus of min-entropies, to show a pretty strong converse for the private
capacity of degraded classical-quantum-quantum (cqq-)wiretap channels, which
generalize Wyner's model of the degraded classical wiretap channel.
While the result is not completely tight, leaving some gap between the region
of error and privacy parameters for which the converse bound holds, and a
larger no-go region, it represents a further step towards an understanding of
strong converses of wiretap channels [cf. Hayashi/Tyagi/Watanabe,
arXiv:1410.0443 for the classical case].Comment: 5 pages, 1 figure, IEEEtran.cls. V2 final (conference) version,
accepted for ISIT 2016 (Barcelona, 10-15 July 2016
Finite-Blocklength Bounds for Wiretap Channels
This paper investigates the maximal secrecy rate over a wiretap channel
subject to reliability and secrecy constraints at a given blocklength. New
achievability and converse bounds are derived, which are shown to be tighter
than existing bounds. The bounds also lead to the tightest second-order coding
rate for discrete memoryless and Gaussian wiretap channels.Comment: extended version of a paper submitted to ISIT 201
Converses for Secret Key Agreement and Secure Computing
We consider information theoretic secret key agreement and secure function
computation by multiple parties observing correlated data, with access to an
interactive public communication channel. Our main result is an upper bound on
the secret key length, which is derived using a reduction of binary hypothesis
testing to multiparty secret key agreement. Building on this basic result, we
derive new converses for multiparty secret key agreement. Furthermore, we
derive converse results for the oblivious transfer problem and the bit
commitment problem by relating them to secret key agreement. Finally, we derive
a necessary condition for the feasibility of secure computation by trusted
parties that seek to compute a function of their collective data, using an
interactive public communication that by itself does not give away the value of
the function. In many cases, we strengthen and improve upon previously known
converse bounds. Our results are single-shot and use only the given joint
distribution of the correlated observations. For the case when the correlated
observations consist of independent and identically distributed (in time)
sequences, we derive strong versions of previously known converses
Wiretap and Gelfand-Pinsker Channels Analogy and its Applications
An analogy framework between wiretap channels (WTCs) and state-dependent
point-to-point channels with non-causal encoder channel state information
(referred to as Gelfand-Pinker channels (GPCs)) is proposed. A good sequence of
stealth-wiretap codes is shown to induce a good sequence of codes for a
corresponding GPC. Consequently, the framework enables exploiting existing
results for GPCs to produce converse proofs for their wiretap analogs. The
analogy readily extends to multiuser broadcasting scenarios, encompassing
broadcast channels (BCs) with deterministic components, degradation ordering
between users, and BCs with cooperative receivers. Given a wiretap BC (WTBC)
with two receivers and one eavesdropper, an analogous Gelfand-Pinsker BC (GPBC)
is constructed by converting the eavesdropper's observation sequence into a
state sequence with an appropriate product distribution (induced by the
stealth-wiretap code for the WTBC), and non-causally revealing the states to
the encoder. The transition matrix of the state-dependent GPBC is extracted
from WTBC's transition law, with the eavesdropper's output playing the role of
the channel state. Past capacity results for the semi-deterministic (SD) GPBC
and the physically-degraded (PD) GPBC with an informed receiver are leveraged
to furnish analogy-based converse proofs for the analogous WTBC setups. This
characterizes the secrecy-capacity regions of the SD-WTBC and the PD-WTBC, in
which the stronger receiver also observes the eavesdropper's channel output.
These derivations exemplify how the wiretap-GP analogy enables translating
results on one problem into advances in the study of the other