18 research outputs found

    Covert Communication over Classical-Quantum Channels

    Full text link
    The square root law (SRL) is the fundamental limit of covert communication over classical memoryless channels (with a classical adversary) and quantum lossy-noisy bosonic channels (with a quantum-powerful adversary). The SRL states that O(n)\mathcal{O}(\sqrt{n}) covert bits, but no more, can be reliably transmitted in nn channel uses with O(n)\mathcal{O}(\sqrt{n}) bits of secret pre-shared between the communicating parties. Here we investigate covert communication over general memoryless classical-quantum (cq) channels with fixed finite-size input alphabets, and show that the SRL governs covert communications in typical scenarios. %This demonstrates that the SRL is achievable over any quantum communications channel using a product-state transmission strategy, where the transmitted symbols in every channel use are drawn from a fixed finite-size alphabet. We characterize the optimal constants in front of n\sqrt{n} for the reliably communicated covert bits, as well as for the number of the pre-shared secret bits consumed. We assume a quantum-powerful adversary that can perform an arbitrary joint (entangling) measurement on all nn channel uses. However, we analyze the legitimate receiver that is able to employ a joint measurement as well as one that is restricted to performing a sequence of measurements on each of nn channel uses (product measurement). We also evaluate the scenarios where covert communication is not governed by the SRL

    Artificial Intersymbol Interference (ISI) to Exploit Receiver Imperfections for Secrecy

    No full text
    Abstract—Secure communication over a wireless channel in the presence of a passive eavesdropper is considered. We present a method to exploit the eavesdropper’s inherent receiver vulnerabilities to obtain everlasting secrecy. An ephemeral cryptographic key is pre-shared between the transmitter and the legitimate receiver and is utilized to induce intentional intersymbol interference (ISI). The legitimate receiver uses the key to cancel the ISI while the eavesdropper, since it does not have the key, cannot do such. It is shown that although ISI reduces the capacity of the main channel, it can lead to a net gain in secrecy rate. The achievable secrecy rates for different ISI filter settings are evaluated and the proposed method is compared with other information-theoretic security schemes. I

    Everlasting Secrecy by Exploiting Non-Idealities of the Eavesdropper's Receiver

    No full text
    corecore