A Model for Adversarial Wiretap Channel
نویسندگان
چکیده
In wiretap model of secure communication, the goal is to provide (asymptotic) perfect secrecy and reliability over a noisy channel that is eavesdropped by an adversary with unlimited computational power. This goal is achieved by taking advantage of the channel noise and without requiring a shared key. The model has attracted considerable attention in recent years because it captures eavesdropping attack in wireless communication. The wiretap adversary is a passive eavesdropping adversary at the physical layer of communication. In this paper we propose a model for adversarial wiretap (AWTP) channel to capture active attacks at this layer. We consider a (ρr, ρw) wiretap adversary who can see a fraction ρr, and modify a fraction ρw, of the sent codeword. The code components that are read and/or modified can be chosen adaptively, and the subsets of read and modified components in general, can be different. AWTP codes provide secrecy and reliability for communication over these channels. We give security and reliability definitions for these codes, and define secrecy capacity of an AWTP channel. The paper has two main contributions. First, we prove a tight upper bound on the rate of AWTP codes for (ρr, ρw)-AWTP channels, and use the bound to derive the secrecy capacity of the channel. Second, we give an explicit construction for a perfectly secure capacity achieving AWTP code family. We show that our AWTP model is a natural generalization of Wyner’s wiretap models, and somewhat surprisingly, also provides a generalization of a seemingly unrelated cryptographic primitive, Secure Message Transmission (SMT). This relation is used to derive a new (and the only known) bound on the transmission rate of one round (ǫ, δ)-SMT protocols. We discuss our results, give the relations with related primitives, and propose directions for future work.
منابع مشابه
Efficient Codes for Adversarial Wiretap Channels
In [13] we proposed a (ρr, ρw)-adversarial wiretap channel model (AWTP) in which the adversary can adaptively choose to see a fraction ρr of the codeword sent over the channel, and modify a fraction ρw of the codeword by adding arbitrary noise values to them. In this paper we give the first efficient construction of a capacity achieving code family that provides perfect secrecy for this channel.
متن کاملGeneralizing Multiple Access Wiretap and Wiretap II Channel Models: Achievable Rates and Cost of Strong Secrecy
In this paper, new two-user multiple access wiretap channel models are studied. First, the multiple access wiretap channel II with a discrete memoryless main channel, under three different wiretapping scenarios, is introduced. The wiretapper, as in the classical wiretap channel II model, chooses a fixedlength subset of the channel uses on which she obtains noise-free observations of one of the ...
متن کاملAutomatic Colorization of Grayscale Images Using Generative Adversarial Networks
Automatic colorization of gray scale images poses a unique challenge in Information Retrieval. The goal of this field is to colorize images which have lost some color channels (such as the RGB channels or the AB channels in the LAB color space) while only having the brightness channel available, which is usually the case in a vast array of old photos and portraits. Having the ability to coloriz...
متن کاملAlmost universal codes for MIMO wiretap channels
Despite several works on secrecy coding for fading and MIMO wiretap channels from an error probability perspective, the construction of information theoretically secure codes over such channels remains as an open problem. In this paper, we consider a fading wiretap channel model where the transmitter has only partial statistical channel state information. We extend the flatness factor criterion...
متن کاملKey Agreement over Wiretap Models with Non-Causal Side Information
The security of information is an indispensable element of a communication system when transmitted signals are vulnerable to eavesdropping. This issue is a challenging problem in a wireless network as propagated signals can be easily captured by unauthorized receivers, and so achieving a perfectly secure communication is a desire in such a wiretap channel. On the other hand, cryptographic algor...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1312.6457 شماره
صفحات -
تاریخ انتشار 2013