Strong Secrecy of Arbitrarily Varying Wiretap Channel With Constraints

被引:3
|
作者
Chen, Yiqi [1 ,2 ]
He, Dan [3 ]
Ying, Chenhao [1 ,2 ]
Luo, Yuan [1 ,2 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, AI Inst, Shanghai 200240, Peoples R China
[2] Shanghai Jiao Tong Univ, MoE Key Lab Artificial Intelligence, AI Inst, Shanghai 200240, Peoples R China
[3] Intel Asia Pacific Res & Dev Ltd, Shanghai 200241, Peoples R China
基金
中国国家自然科学基金;
关键词
Codes; Encoding; Stochastic processes; Upper bound; Jamming; Noise measurement; Numerical models; Arbitrarily varying wiretap channel; stochastic-encoder code; state constraint; strong secrecy; BROADCAST CHANNELS; RANDOM CODES; CAPACITY; INFORMATION;
D O I
10.1109/TIT.2022.3161808
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The strong secrecy transmission problem of the arbitrarily varying wiretap channel (AVWC) with input and state constraints is investigated in this paper. First, a stochastic-encoder code lower bound of the strong secrecy capacity is established by applying the type argument and Csiszar's almost independent coloring lemma. Then, a superposition stochastic-encoder code lower bound of the secrecy capacity is provided. The superposition stochastic-encoder code lower bound can be larger than the ordinary stochastic-encoder code lower bound. Random code lower and upper bounds of the secrecy capacity of the AVWC with constraints are further provided. Based on these results, we further consider a special case of the model, namely severely less noisy AVWC, and give the stochastic-encoder code and random code capacities. It is proved that the stochastic-encoder code capacity of the AVWC with constraints is either equal to or strictly smaller than the corresponding random code capacity, which is consistent with the property of the ordinary AVC. Finally, some numerical examples are presented to better illustrate our capacity results. Compared to the soft covering lemma that requires the codewords to be generated i.i.d., our method has more relaxed requirements regarding codebooks. It is proved that the good codebooks for secure transmission can be generated by choosing codewords randomly from a given type set, which is critical when considering the AVWC with constraints.
引用
收藏
页码:4700 / 4722
页数:23
相关论文
共 50 条
  • [31] Imperfect Secrecy in Wiretap Channel II
    Cheng, Fan
    Yeung, Raymond W.
    Shum, Kenneth W.
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2015, 61 (01) : 628 - 636
  • [32] Enhancing secrecy rates in a wiretap channel
    Shah, Shahid M.
    Sharma, Vinod
    DIGITAL COMMUNICATIONS AND NETWORKS, 2020, 6 (01) : 129 - 135
  • [33] The Secrecy Capacity of the MIMO Wiretap Channel
    Oggier, Frederique
    Hassibi, Babak
    2008 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS, VOLS 1-6, 2008, : 524 - 528
  • [34] Enhancing secrecy rates in a wiretap channel
    Shahid M.Shah
    Vinod Sharma
    Digital Communications and Networks, 2020, 6 (01) : 129 - 135
  • [35] Imperfect Secrecy in Wiretap Channel II
    Cheng, Fan
    Yeung, Raymond W.
    Shum, Kenneth W.
    2012 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS (ISIT), 2012, : 71 - 75
  • [36] List Decoding for Arbitrarily Varying Wiretap Channels
    Mansour, Ahmed S.
    Boche, Holger
    Schaefer, Rafael F.
    2016 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2016, : 611 - 615
  • [37] Strong Secrecy Capacity of a Class of Wiretap Networks
    He, Dan
    Guo, Wangmei
    ENTROPY, 2016, 18 (07):
  • [38] The Arbitrarily Varying Wiretap Channel-Secret Randomness, Stability, and Super-Activation
    Notzel, Janis
    Wiese, Moritz
    Boche, Holger
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2016, 62 (06) : 3504 - 3531
  • [39] Multiple Access Wiretap Channels with Strong Secrecy
    Yassaee, Mohammad Hossein
    Aref, Mohammad Reza
    2010 IEEE INFORMATION THEORY WORKSHOP (ITW), 2010,
  • [40] MIMO Multiple Access Channel With an Arbitrarily Varying Eavesdropper: Secrecy Degrees of Freedom
    He, Xiang
    Khisti, Ashish
    Yener, Aylin
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2013, 59 (08) : 4733 - 4745