TY - GEN
T1 - Derandomizing Codes for the Binary Adversarial Wiretap Channel of Type II
AU - Ruzomberka, Eric
AU - Nikbakht, Homa
AU - Brinton, Christopher G.
AU - Love, David J.
AU - Vincent Poor, H. V.
N1 - Publisher Copyright:
© 2023 IEEE.
PY - 2023
Y1 - 2023
N2 - We revisit the binary adversarial wiretap channel (AWTC) of type II in which an active adversary can read a fraction r and flip a fraction p of codeword bits. The semantic-secrecy capacity of the AWTC II is partially known, where the best-known lower bound is non-constructive, proven via a random coding argument that uses a large number (that is exponential in blocklength n) of random bits to seed the random code. In this paper, we establish a new derandomization result in which we match the best-known lower bound of 1 - H2(p) - r, where H2(•) is the binary entropy function, via a random code that uses a small seed of only O(n2) bits. Our random code construction is a novel application of pseudolinear codes - a class of non-linear codes that have k-wise independent codewords when chosen at random where k is a design parameter. As the key technical tool in our analysis, we provide a soft-covering lemma in the flavor of Goldfeld, Cuff and Permuter (Trans. Inf. Theory 2016) that holds for random codes with k-wise independent codewords.
AB - We revisit the binary adversarial wiretap channel (AWTC) of type II in which an active adversary can read a fraction r and flip a fraction p of codeword bits. The semantic-secrecy capacity of the AWTC II is partially known, where the best-known lower bound is non-constructive, proven via a random coding argument that uses a large number (that is exponential in blocklength n) of random bits to seed the random code. In this paper, we establish a new derandomization result in which we match the best-known lower bound of 1 - H2(p) - r, where H2(•) is the binary entropy function, via a random code that uses a small seed of only O(n2) bits. Our random code construction is a novel application of pseudolinear codes - a class of non-linear codes that have k-wise independent codewords when chosen at random where k is a design parameter. As the key technical tool in our analysis, we provide a soft-covering lemma in the flavor of Goldfeld, Cuff and Permuter (Trans. Inf. Theory 2016) that holds for random codes with k-wise independent codewords.
UR - http://www.scopus.com/inward/record.url?scp=85179501144&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85179501144&partnerID=8YFLogxK
U2 - 10.1109/Allerton58177.2023.10313482
DO - 10.1109/Allerton58177.2023.10313482
M3 - Conference contribution
AN - SCOPUS:85179501144
T3 - 2023 59th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2023
BT - 2023 59th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2023
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 59th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2023
Y2 - 26 September 2023 through 29 September 2023
ER -