TY - GEN
T1 - Secrecy capacity of the wiretap channel with noisy feedback
AU - Lai, Lifeng
AU - El Gamal, Hesham
AU - Poor, H. Vincent
PY - 2007
Y1 - 2007
N2 - In this work, the role of noisy feedback In enhancing the secrecy capacity of the wiretap channel Is Investigated A model Is considered In which the feed-forward and feedback signals share the same noisy channel. More specifically, a discrete memoryless modulo - Additive channel with a full-duplex destina-tion node is considered first, and it is shown that a judicious use of feedback increases the perfect secrecy capacity to the capacity of the source-destination channel in the absence of the wiretappeR. In the achievability scheme, the feedback signal corresponds to a private key, known only to the destination. Then a half-duplex system is considered, for which a novel feedback technique that always achieves a positive perfect secrecy rate (even when the source-wiretapper channel is less noisy than the source-destination channel) Is proposed. These results hinge on the modulo - Additive property of the channel, which is exploited by the destination to perform encryption over the channel without revealing its key to the source.
AB - In this work, the role of noisy feedback In enhancing the secrecy capacity of the wiretap channel Is Investigated A model Is considered In which the feed-forward and feedback signals share the same noisy channel. More specifically, a discrete memoryless modulo - Additive channel with a full-duplex destina-tion node is considered first, and it is shown that a judicious use of feedback increases the perfect secrecy capacity to the capacity of the source-destination channel in the absence of the wiretappeR. In the achievability scheme, the feedback signal corresponds to a private key, known only to the destination. Then a half-duplex system is considered, for which a novel feedback technique that always achieves a positive perfect secrecy rate (even when the source-wiretapper channel is less noisy than the source-destination channel) Is proposed. These results hinge on the modulo - Additive property of the channel, which is exploited by the destination to perform encryption over the channel without revealing its key to the source.
UR - http://www.scopus.com/inward/record.url?scp=84940643997&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84940643997&partnerID=8YFLogxK
M3 - Conference contribution
AN - SCOPUS:84940643997
T3 - 45th Annual Allerton Conference on Communication, Control, and Computing 2007
SP - 864
EP - 868
BT - 45th Annual Allerton Conference on Communication, Control, and Computing 2007
PB - University of Illinois at Urbana-Champaign, Coordinated Science Laboratory and Department of Computer and Electrical Engineering
T2 - 45th Annual Allerton Conference on Communication, Control, and Computing 2007
Y2 - 26 September 2007 through 28 September 2007
ER -