A coding approach to tunable secrecy
نویسندگان
چکیده
We present a new information-theoretic definition and associated results, based on list decoding in a source coding setting. We begin by presenting list-source codes, which naturally map a key length (entropy) to list size. We then show that such codes can be analyzed in the context of a novel information-theoretic metric, ǫsymbol secrecy, that encompasses both the one-time pad and traditional rate-based asymptotic metrics, but, like most cryptographic constructs, can be applied in nonasymptotic settings. We derive fundamental bounds for ǫsymbol secrecy and demonstrate how these bounds can be achieved with MDS codes when the source is uniformly distributed. We discuss applications and implementation issues of our codes.
منابع مشابه
Achievable Secrecy Rate Regions of State Dependent Causal Cognitive Interference Channel
In this paper, the secrecy problem in the state dependent causal cognitive interference channel is studied. The channel state is non-causally known at the cognitive encoder. The message of the cognitive encoder must be kept secret from the primary receiver. We use a coding scheme which is a combination of compress-and-forward strategy with Marton coding, Gel’fand-Pinsker coding and Wyner’s wire...
متن کاملA Simplified Coding Scheme for the Broadcast Channel with Complementary Receiver Side Information under Individual Secrecy Constraints
This paper simplifies an existing coding scheme for the two-receiver discrete memoryless broadcast channel with complementary receiver side information where there is a passive eavesdropper and individual secrecy is required. The existing coding scheme is simplified in two steps by replacing Wyner’s secrecy coding with Carleial-Hellman’s secrecy coding as well as removing additional randomness ...
متن کاملRate Adaptation for Secure HARQ Protocols
This paper investigates secure transmission using HARQ protocol when the encoder only knows the statistics of the channel-state. We analyze the tradeoff between reliability and secrecy probabilistic guarantees. The conventional approach of ensuring the secrecy via introduction of dummy-message is followed. However, unlike the previous works on this subject, we design a coding strategy tailored ...
متن کاملPolar Lattices for Strong Secrecy Over the Mod-$\Lambda$ Gaussian Wiretap Channel
Polar lattices, which are constructed from polar codes, are provably good for the additive white Gaussian noise (AWGN) channel. In this work, we propose a new polar lattice construction that achieves the secrecy capacity under the strong secrecy criterion over the mod-Λ Gaussian wiretap channel. This construction leads to an AWGN-good lattice and a secrecy-good lattice simultaneously. The desig...
متن کاملPolar Coding for the Cognitive Interference Channel with Confidential Messages
In this paper, we propose a low-complexity, secrecy capacity achieving polar coding scheme for the cognitive interference channel with confidential messages (CICC) under the strong secrecy criterion. Existing polar coding schemes for interference channels rely on the use of polar codes for the multiple access channel, the code construction problem of which can be complicated. We show that the w...
متن کامل