Secure Storage Capacity under Rate Constraints-Continuity and Super Activation

Sebastian Baur, Holger Boche, Rafael F. Schaefer, H. Vincent Poor

Research output: Contribution to journalArticlepeer-review

1 Scopus citations

Abstract

The source model for secret key generation with one way public communication refers to a setting in which a secret key should be agreed upon at two terminals. At both terminals correlated components of a common source are available. In addition, a message can be sent from one terminal to the other via a public channel. In this paper, a related scenario is considered where instead of secret key generation, the goal is to securely store data in a public database. The database allows for error-free storing of the data, but is constrained in its size which imposes a rate constraint on storing. The corresponding capacity for secure storage is known and it has been shown that the capacity-achieving strategy satisfies the strong secrecy criterion. Here, the case when the storage in the public database is subject to errors is considered and the corresponding capacity is characterized. In addition, the continuity properties of the two capacity functions are analyzed. These capacity functions are continuous as opposed to the discontinuous secret key capacity with rate constraint. It is shown that for secure storage the phenomenon of super activation can occur. Finally, it is discussed how the results in this paper differ from previous results on super activation.

Original languageEnglish (US)
Article number8766878
Pages (from-to)959-970
Number of pages12
JournalIEEE Transactions on Information Forensics and Security
Volume15
DOIs
StatePublished - 2020

All Science Journal Classification (ASJC) codes

  • Safety, Risk, Reliability and Quality
  • Computer Networks and Communications

Keywords

  • Secret key (SK) generation
  • continuity of capacity
  • rate constraint
  • secure storage
  • super activation

Fingerprint

Dive into the research topics of 'Secure Storage Capacity under Rate Constraints-Continuity and Super Activation'. Together they form a unique fingerprint.

Cite this