Success Exponent of Wiretapper: A Tradeoff between Secrecy and Reliability
نویسنده
چکیده
Equivocation rate has been widely used as an information-theoretic measure of security after Shannon[12]. It simplifies problems by removing the effect of atypical behavior from the system. In [11], however, Merhav and Arikan considered the alternative of using guessing exponent to analyze the Shannon’s cipher system. Because guessing exponent captures the atypical behavior, the strongest expressible notion of secrecy requires the more stringent condition that the size of the key, instead of its entropy rate, to be equal to the size of the message. The relationship between equivocation and guessing exponent are also investigated in [8][9] but it is unclear which is a better measure, and whether there is a unifying measure of security. Instead of using equivocation rate or guessing exponent, we study the wiretap channel in [2] using the success exponent, defined as the exponent of a wiretapper successfully learn the secret after making an exponential number of guesses to a sequential verifier that gives yes/no answer to each guess. By extending the coding scheme in [2][6] and the converse proof in [4] with the new Overlap Lemma V.2, we obtain a tradeoff between secrecy and reliability expressed in terms of lower bounds on the error and success exponents of authorized and respectively unauthorized decoding of the transmitted messages. From this, we obtain an inner bound to the region of strongly achievable public, private and guessing rate triples for which the exponents are strictly positive. The closure of this region is equivalent to the closure of the region in Theorem 1 of [2] when we treat equivocation rate as the guessing rate. However, it is unclear if the inner bound is tight. ACKNOWLEDGMENT I would like to thank Professor Lizhong Zheng for his guidance and valuable comments; Jing Sheng for his inspiring discussion that eventually leads to the proof of Proposition VII.3; and above all, my family for their support and encouragements.
منابع مشابه
Wiretap Channel with Information Embedding on Actions
Information embedding on actions is a new channel model in which a specific decoder is used to observe the actions taken by the encoder and retrieve part of the message intended for the receiver. We revisit this model and consider a different scenario where a secrecy constraint is imposed. By adding a wiretapper in the model, we aim to send the confidential message to the receiver and keep it s...
متن کاملKey Generation Using an External Source of Excitation: Capacity, Reliability, and Secrecy Exponent
We study the fundamental limits to secret key generation from an excited distributed source (EDS). In an EDS a pair of terminals observe dependent sources of randomness excited by a pre-arranged signal. We first determine the secret key capacity for such systems with one-way public messaging. We then characterize a tradeoff between the secret key rate and exponential bounds on the probability o...
متن کاملGeneralizing Multiple Access Wiretap and Wiretap II Channel Models: Achievable Rates and Cost of Strong Secrecy
In this paper, new two-user multiple access wiretap channel models are studied. First, the multiple access wiretap channel II with a discrete memoryless main channel, under three different wiretapping scenarios, is introduced. The wiretapper, as in the classical wiretap channel II model, chooses a fixedlength subset of the channel uses on which she obtains noise-free observations of one of the ...
متن کاملThe Three-Receiver Broadcast Channel with Degraded Message Sets and Confidential Messages
In this paper, bounds to the secrecy capacity region for the general 3-receiver broadcast channel with 3 degraded message sets, are presented for confidential messages sent to be kept secret from one of the receivers. This model is a more general model than 2-receiver broadcast channels with confidential messages with an external wiretapper, and recently studied 3-receiver degraded broadcast ch...
متن کاملSecrecy Communication with Security Rate Measure
We introduce a new measure on secrecy, which is established based on rate-distortion theory. It is named security rate, which is the minimum (infimum) of the additional rate needed to reconstruct the source within target distortion level with any positive probability for wiretapper. It denotes the minimum distance in information metric (bits) from what wiretapper has received to any decrypted r...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/0805.3605 شماره
صفحات -
تاریخ انتشار 2008