TY - GEN
T1 - Wiretap channels with random states non-causally available at the encoder
AU - Goldfeld, Ziv
AU - Cuff, Paul
AU - Permuter, Haim H.
N1 - Publisher Copyright:
© 2016 IEEE.
PY - 2017/1/4
Y1 - 2017/1/4
N2 - We study the state-dependent (SD) wiretap channel (WTC) with non-causal channel state information (CSI) at the encoder. This model subsumes all other instances of CSI availability as special cases, and calls for an efficient utilization of the state sequence both for reliability and security purposes. A lower bound on the secrecy-capacity, that improves upon the previously best known result by Chen and Han Vinck, is derived based on a novel superposition coding scheme. The improvement over the Chen and Han Vinck result is strict for some SD-WTCs. Specializing the lower bound to the case where CSI is also available to the decoder reveals that it is at least as good as the achievable formula by Chia and El-Gamal, which is already known to outperform the adaptation of the Chen and Han Vinck code to the encoder and decoder CSI scenario. The results are derived under the strict semantic-security metric that requires negligible information leakage for all message distributions.
AB - We study the state-dependent (SD) wiretap channel (WTC) with non-causal channel state information (CSI) at the encoder. This model subsumes all other instances of CSI availability as special cases, and calls for an efficient utilization of the state sequence both for reliability and security purposes. A lower bound on the secrecy-capacity, that improves upon the previously best known result by Chen and Han Vinck, is derived based on a novel superposition coding scheme. The improvement over the Chen and Han Vinck result is strict for some SD-WTCs. Specializing the lower bound to the case where CSI is also available to the decoder reveals that it is at least as good as the achievable formula by Chia and El-Gamal, which is already known to outperform the adaptation of the Chen and Han Vinck code to the encoder and decoder CSI scenario. The results are derived under the strict semantic-security metric that requires negligible information leakage for all message distributions.
UR - http://www.scopus.com/inward/record.url?scp=85014195695&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85014195695&partnerID=8YFLogxK
U2 - 10.1109/ICSEE.2016.7806196
DO - 10.1109/ICSEE.2016.7806196
M3 - Conference contribution
AN - SCOPUS:85014195695
T3 - 2016 IEEE International Conference on the Science of Electrical Engineering, ICSEE 2016
BT - 2016 IEEE International Conference on the Science of Electrical Engineering, ICSEE 2016
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2016 IEEE International Conference on the Science of Electrical Engineering, ICSEE 2016
Y2 - 16 November 2016 through 18 November 2016
ER -