DocumentCode :
112372
Title :
Secret Communication Over Broadcast Erasure Channels With State-Feedback
Author :
Czap, Laszlo ; Prabhakaran, Vinod M. ; Fragouli, Christina ; Diggavi, Suhas N.
Author_Institution :
Ecole Polytech. Fed. de, Lausanne, Switzerland
Volume :
61
Issue :
9
fYear :
2015
fDate :
Sept. 2015
Firstpage :
4788
Lastpage :
4808
Abstract :
We consider a 1-to-K communication scenario, where a source transmits private messages to K receivers through a broadcast erasure channel, and the receivers feedback strictly, causally, and publicly their channel states after each transmission. We explore the achievable rate region when we require that the message to each receiver remains secret-in the information theoretical sense-from all the other receivers. We characterize the capacity of secure communication in all the cases where the capacity of the 1-to-K communication scenario without the requirement of security is known. As a special case, we characterize the secret-message capacity of a single receiver point-to-point erasure channel with public state-feedback in the presence of a passive eavesdropper. We find that in all the cases where we have an exact characterization, we can achieve the capacity using linear complexity two-phase schemes: in the first phase, we create appropriate secret keys, and in the second phase, we use them to encrypt each message. We find that the amount of key we need is smaller than the size of the message, and equal to the amount of encrypted message the potential eavesdroppers jointly collect. Moreover, we prove that a dishonest receiver that provides deceptive feedback cannot diminish the rate experienced by the honest receivers. We also develop a converse proof which reflects the two-phase structure of our achievability scheme. As a side result, our technique leads to a new outer bound proof for the nonsecure communication problem.
Keywords :
broadcast channels; cryptography; network coding; state feedback; telecommunication security; wireless channels; 1-to-K communication scenario; achievable rate region; appropriate secret key creation; broadcast erasure channels; deceptive feedback; linear complexity two-phase scheme; message encryption; network coding; passive eavesdropper; public state-feedback; secret communication capacity; secret-message capacity; single receiver point-to-point erasure channel; Cryptography; Joints; Receivers; Reliability; Silicon; Wireless communication; Data security; encoding; network coding; telecommunication security;
fLanguage :
English
Journal_Title :
Information Theory, IEEE Transactions on
Publisher :
ieee
ISSN :
0018-9448
Type :
jour
DOI :
10.1109/TIT.2015.2449838
Filename :
7134768
Link To Document :
بازگشت