DocumentCode :
3126733
Title :
Broadcasting private messages securely
Author :
Czap, László ; Prabhakaran, Vinod M. ; Diggavi, Suhas ; Fragouli, Christina
Author_Institution :
EPFL, Lausanne, Switzerland
fYear :
2012
fDate :
1-6 July 2012
Firstpage :
428
Lastpage :
432
Abstract :
Consider a source, Alice, broadcasting private messages to multiple receivers through a broadcast erasure channel; users send back to Alice public feedback that she causally uses to decide the coding strategy for her following transmissions. Recently, the multiple unicast capacity region for this problem has been exactly characterized for a number of special cases; namely the 2-user, 3-user, symmetric K-user, and one-sidedly fair K-user [1], [2]. In this paper, we show that for all the cases where such characterizations exist, we can also optimally characterize the “secure” communication rates, where the message that Alice transmits to each user is information theoretically secure from the other users, even if these collude. We show that a simple, two-phase strategy, where appropriate amounts of secret keys are first generated and then consumed, matches a new outer bound we derive.
Keywords :
channel coding; radio broadcasting; radio receivers; telecommunication security; Alice public feedback; broadcast erasure channel; coding strategy; multiple receivers; multiple unicast capacity region; one-sidedly fair K-user; private message broadcasting security; secure communication rates; symmetric K-user; two-phase strategy; Cryptography; Information theory; Protocols; Receivers; Silicon; Vectors;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Theory Proceedings (ISIT), 2012 IEEE International Symposium on
Conference_Location :
Cambridge, MA
ISSN :
2157-8095
Print_ISBN :
978-1-4673-2580-6
Electronic_ISBN :
2157-8095
Type :
conf
DOI :
10.1109/ISIT.2012.6284224
Filename :
6284224
Link To Document :
بازگشت