Wiretap channel with secure rate-limited feedback
E Ardestanizadeh, M Franceschetti… - IEEE Transactions …, 2009 - ieeexplore.ieee.org
IEEE Transactions on Information Theory, 2009•ieeexplore.ieee.org
This paper studies the problem of secure communication over a wiretap channel p (y, z| x)
with a secure feedback link of rate R f, where X is the channel input, and Y and Z are
channel outputs observed by the legitimate receiver and the eavesdropper, respectively. It is
shown that the secrecy capacity, the maximum data rate of reliable communication while the
intended message is not revealed to the eavesdropper, is upper bounded as C s (R f) les
maxmin/p (x){I (X; Y), I (X; Y| Z)+ R f}. The proof of the bound crucially depends on a …
with a secure feedback link of rate R f, where X is the channel input, and Y and Z are
channel outputs observed by the legitimate receiver and the eavesdropper, respectively. It is
shown that the secrecy capacity, the maximum data rate of reliable communication while the
intended message is not revealed to the eavesdropper, is upper bounded as C s (R f) les
maxmin/p (x){I (X; Y), I (X; Y| Z)+ R f}. The proof of the bound crucially depends on a …
This paper studies the problem of secure communication over a wiretap channel p(y,z|x) with a secure feedback link of rate Rf, where X is the channel input, and Y and Z are channel outputs observed by the legitimate receiver and the eavesdropper, respectively. It is shown that the secrecy capacity, the maximum data rate of reliable communication while the intended message is not revealed to the eavesdropper, is upper bounded as Cs(Rf) les maxmin/p(x) {I(X;Y), I(X;Y |Z) + Rf}. The proof of the bound crucially depends on a recursive argument which is used to obtain the single-letter characterization. This upper bound is shown to be tight for the class of physically degraded wiretap channels. A capacity-achieving coding scheme is presented for this case, in which the receiver securely feeds back fresh randomness with rate Rf, generated independent of the received channel output symbols. The transmitter then uses this shared randomness as a secret key on top of Wyner's coding scheme for wiretap channels without feedback. Hence, when a feedback link is available, the receiver should allocate all resources to convey a new key rather than sending back the channel output.
ieeexplore.ieee.org
Showing the best result for this search. See all results