Semantically-Secured message-Key trade-Off over wiretap channels with random parameters: Invited paper

Alexander Bunin, Ziv Goldfeld, Haim H. Permuter, Shlomo Shamai Shitz, Paul Cuff, Pablo Piantanida

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Scopus citations

Abstract

We study the trade-off between secret message (SM) and secret key (SK) rates simultaneously achievable over a state-dependent (SD) wiretap channel (WTC) with non-causal channel state information (CSI) at the encoder. Thismodel subsumes all other instances of CSI availability as special cases, and calls for an efficient utilization of the state sequence both for reliability and security purposes. An inner bound on the semantic-security (SS) SM-SK capacity region is derived based on a novel superposition coding scheme. Our inner bound improves upon the previously best known SM-SK trade-off result by Prabhakaran et al., and to the best of our knowledge, upon all other existing lower bounds for either SM or SK for this setup. The results are derived under the strict semantic-security metric that requires negligible information leakage for all message-key distributions. The achievability proof uses the strong soft-covering lemma for superposition codes.

Original languageEnglish (US)
Title of host publicationProceedings of the 2nd Workshop on Communication Security - Cryptography and Physical Layer Security
EditorsStefano Tomasin, Marco Baldi, Elizabeth A. Quaglia
PublisherSpringer Verlag
Pages33-48
Number of pages16
ISBN (Print)9783319592640
DOIs
StatePublished - 2018
Event2nd Workshop on Communication Security, WCS 2017 - Paris, France
Duration: Apr 30 2017Apr 30 2017

Publication series

NameLecture Notes in Electrical Engineering
Volume447
ISSN (Print)1876-1100
ISSN (Electronic)1876-1119

Other

Other2nd Workshop on Communication Security, WCS 2017
Country/TerritoryFrance
CityParis
Period4/30/174/30/17

All Science Journal Classification (ASJC) codes

  • Industrial and Manufacturing Engineering

Fingerprint

Dive into the research topics of 'Semantically-Secured message-Key trade-Off over wiretap channels with random parameters: Invited paper'. Together they form a unique fingerprint.

Cite this